lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CADwYKibXz94cbrRQPPg7Y3q=wkr4kNfxmXhJmrf7vMVakyV28g@mail.gmail.com>
Date: Fri, 30 May 2014 08:17:51 -0400
From: Allen D <multimode1876@...il.com>
To: "Ivan .Heca" <ivanhec@...il.com>
Cc: fulldisclosure@...lists.org
Subject: Re: [FD] US cybercrime laws being used to target security
 researchers | Technology | The Guardian

Personally I felt this was a bit of yellow journalism on the part of the
guardian.  The only fact I saw in the article was that HD was approached by
LEO about his project involving aggressive scans of the Internet.
According the the article that happened a year ago, isn't this project
still ongoing?  If HD was "targeted", where are the legal proceedings? If
this happened a year ago; How is this "news"?

The rest of the article seems to be based on opinions and speculation about
how much harm would come to the world if in fact the LEO's were "targeting
security researchers".

Feel free to point out any facts I may have missed, the headline read* "US
cybercrime laws being used to target security researchers"* however the
body of the article didn’t have many facts supporting that claim. I would
also have expected HD to be more vocal about something like this.  I think
I would give the article more credibility if it had stated the branch of
law enforcement.

Then again maybe I just need to re-read the article.


On Fri, May 30, 2014 at 1:09 AM, Ivan .Heca <ivanhec@...il.com> wrote:

> HD Moore, creator of the ethical hacking tool Metasploit and chief research
> officer of security consultancy Rapid7, told the Guardian he had been
> warned by US law enforcement last year over a scanning project called
> Critical.IO, which he started in 2012. The initiative sought to find
> widespread vulnerabilities using automated computer programs to uncover the
> weaknesses across the entire internet.
>
>
> http://www.theguardian.com/technology/2014/may/29/us-cybercrime-laws-security-researchers
>
> _______________________________________________
> Sent through the Full Disclosure mailing list
> http://nmap.org/mailman/listinfo/fulldisclosure
> Web Archives & RSS: http://seclists.org/fulldisclosure/
>

_______________________________________________
Sent through the Full Disclosure mailing list
http://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ