[cryptome] Re: Security and the Rise of Snakeoil

  • From: Aftermath <aftermath.thegreat@xxxxxxxxx>
  • To: "cryptome@xxxxxxxxxxxxx" <cryptome@xxxxxxxxxxxxx>
  • Date: Thu, 17 Jul 2014 14:24:10 -0700

coderman, you said "some free passwords" but clearly you have only provided
1


On Thu, Jul 17, 2014 at 12:26 PM, coderman <coderman@xxxxxxxxx> wrote:

> On Wed, Jul 16, 2014 at 1:41 PM, In Harms Way <11414150173@xxxxxxxxxx>
> wrote:
> > Security and the Rise of Snakeoil
> > Published: 04 June 2014
> > The original of this essay was written by stf in Hungarian. I decided to
> go
> > ahead and translate it into English because I liked it.
>
> good indeed!
>  ... now if only it wasn't so depressing and intimidating ;)
> i have some other ideas for a way out of the mess.[0]
>
>
>
> > how often do you update your systems?
>
> constantly.
>
>
>
> > how strong are your email passwords? do you reuse them for other pages,
> too?
>
> i pick a new one for every purpose, the stronger the better.
> (some services don't let you pick a strong password) [1]
>
>
>
> > how many of your peers use GMail, Facebook, Skype, and do you keep in
> touch
> > with them through these?
>
> i have no idea about Facestab or Skrap, but i and a few others use
> GMail to express contempt for email as a whole and better data mine
> (search) public list archives.
>
> nothing conveys my contempt for email like a gmail account!
>
>
> best regards,
>
>
>
> 0.  "security by self evident existence"
> """
> Red-Team Networks Everywhere!!!
> This effort attempts to remedy the pervasive and comprehensive
> vulnerability of consumer, industry, and government hardware and
> software systems.  In order to achieve best effective posture with
> maximum haste apply four principles globally:
>
> 1) Blanket Legal Invulnerability
> Remove all criminal and civil liability for "hacking", computer
> trespass, and all related activities performed over data networks;
> establish proactive "shield" legislation to protect and encourage
> unrestricted security research of any subject on any network. extend
> to international agreements for blanket protection in all
> jurisdictions.
>
> 2) Educational Support Everywhere
> Establish lock picking, computing, and hacking curriculum in pre
> school through grade school with subsidized access to technical
> resources including mobile, tablet, laptop test equipment, grid/cloud
> computing on-demand, software defined radios with full
> receive/transmit, and gigabit internet service or faster.
>
> 3) Collaborative Competitions
> Organize a program of blue and red teaming challenges for educational
> and public participation at the district, regional, and national level
> cultivating expertise and rewarding it with hacking toys, access, and
> monies.
>
> 4) Privileged Positioning
> Direct and unrestricted backbone access to various individuals or
> groups who demonstrate competence in either the educational or
> competitive realms, in order for them to mount additional attack
> strategies against any reach-able target. this access must consist of
> both passive taps of backbone traffic as well as injection taps for
> raw packet transmission at core rates. this should be available on the
> Internet backbone at internet exchanges, private fiber through public
> right of way, and core networks of operators of licensed wireless
> spectrum.
>
> end result / strong attractor:
> Open software and hardware widely in use in
> post-privacy-protection-purge future will invert power structure to
> defender with near unassailable advantage in "cyber domain".  Any
> attacker required to compete against the global, collaborative,
> massive, iterative-crowd-hardened systems publicly in use.
> """
>
>
>
> 1. some free passwords!  these are all sekure, don't worry :)
> dad2d212-3c6e-4d8e-9930-a8283186ed4b f3a56155-5f06-4e0f-8812-4e3b27050268
> d66fba0b-f8fa-4bc9-9e35-26b368398712 cbf4152c-5753-471a-89b6-f6ae92943ca1
> ve7zahchohla4iehoh6EimahgaireeN2 Ohph3shieth1shoal7ohQuohpohs4eed
> ex5eenoobeeRoyie4Oe5uchoo8ashooK soowugh6lah1fohraiMahnobaeShai1A
> o2{|!y)ebr-VsP.RXN214']('TcU;/SJ 4@2a,T.,N;os9Swe$`*(pn7z'T|o&J&Q
> }}!"m;QV"QoAkN4.8]jLGhhnnSfL+&y3 [t++W|/#`I\S<DlO7/=%3}t7H0xHJ.zs
> K%EMKqh$k7%>86erJ>_19>e!GQh12N0s ;tyN9Zc>%}ZnydEIHCN^RQVH>6Cny'[W
> %^XSnBXc!3Z~~P/fF=>8 U[:ninIDx9i;4Rja|%m$ 6E6<ZtYu~;R\L?<HGoJn
> Q+H=|Q9Ul"-|,_fFi[4h rDFsP{waE5>*DN#j5U?I 2/!3PVzFp-'`u5C#+40I
> <.-[#Yf=9P#3Va$GdXrp x+1'T%1Yzb-CxM*l+yP/ ;tAa!q@41P%w5:zX0Xjy
> <b/5Ylgfow3vB/%A nlYF+IXpK|3QND)" r`'%UTZ)7F?&&U|C iLXRef}T:I3WR}m?
> &@ytq(nN-K+^z89' 7snnm46zH?f`'N)M w3&Hz.6rj=uxq=pV Ac_>,D~hHY{P5CkJ
> 1<"dOj=g*^Ek+fiX G|]rfs1i.'+H}3*7 gaP!%8N$3Wz-dB2M LR"yyx|C6-)_za='
> H[`R0a+NIu1E 4S#|Q>,}XFsg LZ.3jE.9l/J= 9MZq38P<3,K< P9G!|-TeR3$n
> lzOb4I#>F(yx
> h~UDZ_;.8@eB BN1R@AkD%6]c zt6.w|kG1Ub' *%QnT\!99}Ee ;BO#gNUzc5!e
> 1SM(>nM'^#12
> Ni;#Yl2GX':g F@A*WYc@06%f T(-w$/$t_9*z W,/9I+&xsDx/ :7MVV|#2|CFd
> lJz?Z)m1)2<7
> ohhu1foh3Eivah6Ohngo cothahquaiQuuogo6dei oba8ui7doh8eik0Ap4fe
> jooReedi4huneo7Pohto oox7eix2paeShoo3kohh eiteash9footi7Cheequ
> Ye9ka9uashoo6uYah8ei XohxeeC8paQueirielae aezol4ai0cahhaiCaeli
> goh7phae4chaWo0U ieloo7ish1Ievooz NiyoosaePaghau4e eif1geeZuoth0eNg
> PhishooshooYif9w neenahQu9ileesh2 ahMo2rooF3Faevei Ahqu7ukees1shool
> Joocie9ge1aecang iew4po5eNgeetoce Thoh1iu6ief4ohVi Ohme5PhaeSho8uxe
> eif1yei8 ietig0oo keif4eil dah5fafu bie3oshu saiviz1u ese1uec2 ietohbe3
> ahxizee4 aid1aek9 rohjugh2 eo1if3ph ohoh1uu8 dooz8ze6 nai9saeh aeking0z
> ha4equie jae6iz2j noo8aeyu iech2jam ba0feech ohng6aer aa1eid0u yoh6paep
> 21414 25410 12686 04946 11072 19016 26291
> 0176501025 2925313469 2932201624
> 1,5,13,17  1,8,16,20  4,5,13,17  2,7,15,19
>
>

Other related posts: