[cryptome] Re: Security and the Rise of Snakeoil

  • From: Ryan Carboni <ryacko@xxxxxxxxx>
  • To: cryptome@xxxxxxxxxxxxx
  • Date: Thu, 17 Jul 2014 14:27:55 -0700

those are clearly space separated values


On Thu, Jul 17, 2014 at 2:24 PM, Aftermath <aftermath.thegreat@xxxxxxxxx>
wrote:

> coderman, you said "some free passwords" but clearly you have only
> provided 1
>
>
> On Thu, Jul 17, 2014 at 12:26 PM, coderman <coderman@xxxxxxxxx> wrote:
>
>> On Wed, Jul 16, 2014 at 1:41 PM, In Harms Way <11414150173@xxxxxxxxxx>
>> wrote:
>> > Security and the Rise of Snakeoil
>> > Published: 04 June 2014
>> > The original of this essay was written by stf in Hungarian. I decided
>> to go
>> > ahead and translate it into English because I liked it.
>>
>> good indeed!
>>  ... now if only it wasn't so depressing and intimidating ;)
>> i have some other ideas for a way out of the mess.[0]
>>
>>
>>
>> > how often do you update your systems?
>>
>> constantly.
>>
>>
>>
>> > how strong are your email passwords? do you reuse them for other pages,
>> too?
>>
>> i pick a new one for every purpose, the stronger the better.
>> (some services don't let you pick a strong password) [1]
>>
>>
>>
>> > how many of your peers use GMail, Facebook, Skype, and do you keep in
>> touch
>> > with them through these?
>>
>> i have no idea about Facestab or Skrap, but i and a few others use
>> GMail to express contempt for email as a whole and better data mine
>> (search) public list archives.
>>
>> nothing conveys my contempt for email like a gmail account!
>>
>>
>> best regards,
>>
>>
>>
>> 0.  "security by self evident existence"
>> """
>> Red-Team Networks Everywhere!!!
>> This effort attempts to remedy the pervasive and comprehensive
>> vulnerability of consumer, industry, and government hardware and
>> software systems.  In order to achieve best effective posture with
>> maximum haste apply four principles globally:
>>
>> 1) Blanket Legal Invulnerability
>> Remove all criminal and civil liability for "hacking", computer
>> trespass, and all related activities performed over data networks;
>> establish proactive "shield" legislation to protect and encourage
>> unrestricted security research of any subject on any network. extend
>> to international agreements for blanket protection in all
>> jurisdictions.
>>
>> 2) Educational Support Everywhere
>> Establish lock picking, computing, and hacking curriculum in pre
>> school through grade school with subsidized access to technical
>> resources including mobile, tablet, laptop test equipment, grid/cloud
>> computing on-demand, software defined radios with full
>> receive/transmit, and gigabit internet service or faster.
>>
>> 3) Collaborative Competitions
>> Organize a program of blue and red teaming challenges for educational
>> and public participation at the district, regional, and national level
>> cultivating expertise and rewarding it with hacking toys, access, and
>> monies.
>>
>> 4) Privileged Positioning
>> Direct and unrestricted backbone access to various individuals or
>> groups who demonstrate competence in either the educational or
>> competitive realms, in order for them to mount additional attack
>> strategies against any reach-able target. this access must consist of
>> both passive taps of backbone traffic as well as injection taps for
>> raw packet transmission at core rates. this should be available on the
>> Internet backbone at internet exchanges, private fiber through public
>> right of way, and core networks of operators of licensed wireless
>> spectrum.
>>
>> end result / strong attractor:
>> Open software and hardware widely in use in
>> post-privacy-protection-purge future will invert power structure to
>> defender with near unassailable advantage in "cyber domain".  Any
>> attacker required to compete against the global, collaborative,
>> massive, iterative-crowd-hardened systems publicly in use.
>> """
>>
>>
>>
>> 1. some free passwords!  these are all sekure, don't worry :)
>> dad2d212-3c6e-4d8e-9930-a8283186ed4b f3a56155-5f06-4e0f-8812-4e3b27050268
>> d66fba0b-f8fa-4bc9-9e35-26b368398712 cbf4152c-5753-471a-89b6-f6ae92943ca1
>> ve7zahchohla4iehoh6EimahgaireeN2 Ohph3shieth1shoal7ohQuohpohs4eed
>> ex5eenoobeeRoyie4Oe5uchoo8ashooK soowugh6lah1fohraiMahnobaeShai1A
>> o2{|!y)ebr-VsP.RXN214']('TcU;/SJ 4@2a,T.,N;os9Swe$`*(pn7z'T|o&J&Q
>> }}!"m;QV"QoAkN4.8]jLGhhnnSfL+&y3 [t++W|/#`I\S<DlO7/=%3}t7H0xHJ.zs
>> K%EMKqh$k7%>86erJ>_19>e!GQh12N0s ;tyN9Zc>%}ZnydEIHCN^RQVH>6Cny'[W
>> %^XSnBXc!3Z~~P/fF=>8 U[:ninIDx9i;4Rja|%m$ 6E6<ZtYu~;R\L?<HGoJn
>> Q+H=|Q9Ul"-|,_fFi[4h rDFsP{waE5>*DN#j5U?I 2/!3PVzFp-'`u5C#+40I
>> <.-[#Yf=9P#3Va$GdXrp x+1'T%1Yzb-CxM*l+yP/ ;tAa!q@41P%w5:zX0Xjy
>> <b/5Ylgfow3vB/%A nlYF+IXpK|3QND)" r`'%UTZ)7F?&&U|C iLXRef}T:I3WR}m?
>> &@ytq(nN-K+^z89' 7snnm46zH?f`'N)M w3&Hz.6rj=uxq=pV Ac_>,D~hHY{P5CkJ
>> 1<"dOj=g*^Ek+fiX G|]rfs1i.'+H}3*7 gaP!%8N$3Wz-dB2M LR"yyx|C6-)_za='
>> H[`R0a+NIu1E 4S#|Q>,}XFsg LZ.3jE.9l/J= 9MZq38P<3,K< P9G!|-TeR3$n
>> lzOb4I#>F(yx
>> h~UDZ_;.8@eB BN1R@AkD%6]c zt6.w|kG1Ub' *%QnT\!99}Ee ;BO#gNUzc5!e
>> 1SM(>nM'^#12
>> Ni;#Yl2GX':g F@A*WYc@06%f T(-w$/$t_9*z W,/9I+&xsDx/ :7MVV|#2|CFd
>> lJz?Z)m1)2<7
>> ohhu1foh3Eivah6Ohngo cothahquaiQuuogo6dei oba8ui7doh8eik0Ap4fe
>> jooReedi4huneo7Pohto oox7eix2paeShoo3kohh eiteash9footi7Cheequ
>> Ye9ka9uashoo6uYah8ei XohxeeC8paQueirielae aezol4ai0cahhaiCaeli
>> goh7phae4chaWo0U ieloo7ish1Ievooz NiyoosaePaghau4e eif1geeZuoth0eNg
>> PhishooshooYif9w neenahQu9ileesh2 ahMo2rooF3Faevei Ahqu7ukees1shool
>> Joocie9ge1aecang iew4po5eNgeetoce Thoh1iu6ief4ohVi Ohme5PhaeSho8uxe
>> eif1yei8 ietig0oo keif4eil dah5fafu bie3oshu saiviz1u ese1uec2 ietohbe3
>> ahxizee4 aid1aek9 rohjugh2 eo1if3ph ohoh1uu8 dooz8ze6 nai9saeh aeking0z
>> ha4equie jae6iz2j noo8aeyu iech2jam ba0feech ohng6aer aa1eid0u yoh6paep
>> 21414 25410 12686 04946 11072 19016 26291
>> 0176501025 2925313469 2932201624
>> 1,5,13,17  1,8,16,20  4,5,13,17  2,7,15,19
>>
>>
>

Other related posts: