lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <1304014070.2239.13.camel@hp> Date: Thu, 28 Apr 2011 21:07:50 +0300 From: Tõnu Samuel <tonu@....ee> To: Marsh Ray <marsh@...endedsubset.com> Cc: full-disclosure@...ts.grok.org.uk Subject: Re: Barracuda backdoor > Let's be careful though: just because your system stopped working > doesn't mean it has a backdoor. It could have been implemented as simply > a periodic "phone home for updates" which received some type of > "license expired" message. A remote kill switch, for sure, but not > necessarily the same as a back door. For now I have reports from people who do not want to expose them but claim that Barracuda people can freely log in into their systems but never asked for password etc. This time I have no proof etc. Just I get lot of different pieces of feedback in private. Tõnu _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists