space values would indeed help the security of the password On Thu, Jul 17, 2014 at 2:27 PM, Ryan Carboni <ryacko@xxxxxxxxx> wrote: > those are clearly space separated values > > > On Thu, Jul 17, 2014 at 2:24 PM, Aftermath <aftermath.thegreat@xxxxxxxxx> > wrote: > >> coderman, you said "some free passwords" but clearly you have only >> provided 1 >> >> >> On Thu, Jul 17, 2014 at 12:26 PM, coderman <coderman@xxxxxxxxx> wrote: >> >>> On Wed, Jul 16, 2014 at 1:41 PM, In Harms Way <11414150173@xxxxxxxxxx> >>> wrote: >>> > Security and the Rise of Snakeoil >>> > Published: 04 June 2014 >>> > The original of this essay was written by stf in Hungarian. I decided >>> to go >>> > ahead and translate it into English because I liked it. >>> >>> good indeed! >>> ... now if only it wasn't so depressing and intimidating ;) >>> i have some other ideas for a way out of the mess.[0] >>> >>> >>> >>> > how often do you update your systems? >>> >>> constantly. >>> >>> >>> >>> > how strong are your email passwords? do you reuse them for other >>> pages, too? >>> >>> i pick a new one for every purpose, the stronger the better. >>> (some services don't let you pick a strong password) [1] >>> >>> >>> >>> > how many of your peers use GMail, Facebook, Skype, and do you keep in >>> touch >>> > with them through these? >>> >>> i have no idea about Facestab or Skrap, but i and a few others use >>> GMail to express contempt for email as a whole and better data mine >>> (search) public list archives. >>> >>> nothing conveys my contempt for email like a gmail account! >>> >>> >>> best regards, >>> >>> >>> >>> 0. "security by self evident existence" >>> """ >>> Red-Team Networks Everywhere!!! >>> This effort attempts to remedy the pervasive and comprehensive >>> vulnerability of consumer, industry, and government hardware and >>> software systems. In order to achieve best effective posture with >>> maximum haste apply four principles globally: >>> >>> 1) Blanket Legal Invulnerability >>> Remove all criminal and civil liability for "hacking", computer >>> trespass, and all related activities performed over data networks; >>> establish proactive "shield" legislation to protect and encourage >>> unrestricted security research of any subject on any network. extend >>> to international agreements for blanket protection in all >>> jurisdictions. >>> >>> 2) Educational Support Everywhere >>> Establish lock picking, computing, and hacking curriculum in pre >>> school through grade school with subsidized access to technical >>> resources including mobile, tablet, laptop test equipment, grid/cloud >>> computing on-demand, software defined radios with full >>> receive/transmit, and gigabit internet service or faster. >>> >>> 3) Collaborative Competitions >>> Organize a program of blue and red teaming challenges for educational >>> and public participation at the district, regional, and national level >>> cultivating expertise and rewarding it with hacking toys, access, and >>> monies. >>> >>> 4) Privileged Positioning >>> Direct and unrestricted backbone access to various individuals or >>> groups who demonstrate competence in either the educational or >>> competitive realms, in order for them to mount additional attack >>> strategies against any reach-able target. this access must consist of >>> both passive taps of backbone traffic as well as injection taps for >>> raw packet transmission at core rates. this should be available on the >>> Internet backbone at internet exchanges, private fiber through public >>> right of way, and core networks of operators of licensed wireless >>> spectrum. >>> >>> end result / strong attractor: >>> Open software and hardware widely in use in >>> post-privacy-protection-purge future will invert power structure to >>> defender with near unassailable advantage in "cyber domain". Any >>> attacker required to compete against the global, collaborative, >>> massive, iterative-crowd-hardened systems publicly in use. >>> """ >>> >>> >>> >>> 1. some free passwords! these are all sekure, don't worry :) >>> dad2d212-3c6e-4d8e-9930-a8283186ed4b f3a56155-5f06-4e0f-8812-4e3b27050268 >>> d66fba0b-f8fa-4bc9-9e35-26b368398712 cbf4152c-5753-471a-89b6-f6ae92943ca1 >>> ve7zahchohla4iehoh6EimahgaireeN2 Ohph3shieth1shoal7ohQuohpohs4eed >>> ex5eenoobeeRoyie4Oe5uchoo8ashooK soowugh6lah1fohraiMahnobaeShai1A >>> o2{|!y)ebr-VsP.RXN214']('TcU;/SJ 4@2a,T.,N;os9Swe$`*(pn7z'T|o&J&Q >>> }}!"m;QV"QoAkN4.8]jLGhhnnSfL+&y3 [t++W|/#`I\S<DlO7/=%3}t7H0xHJ.zs >>> K%EMKqh$k7%>86erJ>_19>e!GQh12N0s ;tyN9Zc>%}ZnydEIHCN^RQVH>6Cny'[W >>> %^XSnBXc!3Z~~P/fF=>8 U[:ninIDx9i;4Rja|%m$ 6E6<ZtYu~;R\L?<HGoJn >>> Q+H=|Q9Ul"-|,_fFi[4h rDFsP{waE5>*DN#j5U?I 2/!3PVzFp-'`u5C#+40I >>> <.-[#Yf=9P#3Va$GdXrp x+1'T%1Yzb-CxM*l+yP/ ;tAa!q@41P%w5:zX0Xjy >>> <b/5Ylgfow3vB/%A nlYF+IXpK|3QND)" r`'%UTZ)7F?&&U|C iLXRef}T:I3WR}m? >>> &@ytq(nN-K+^z89' 7snnm46zH?f`'N)M w3&Hz.6rj=uxq=pV Ac_>,D~hHY{P5CkJ >>> 1<"dOj=g*^Ek+fiX G|]rfs1i.'+H}3*7 gaP!%8N$3Wz-dB2M LR"yyx|C6-)_za=' >>> H[`R0a+NIu1E 4S#|Q>,}XFsg LZ.3jE.9l/J= 9MZq38P<3,K< P9G!|-TeR3$n >>> lzOb4I#>F(yx >>> h~UDZ_;.8@eB BN1R@AkD%6]c zt6.w|kG1Ub' *%QnT\!99}Ee ;BO#gNUzc5!e >>> 1SM(>nM'^#12 >>> Ni;#Yl2GX':g F@A*WYc@06%f T(-w$/$t_9*z W,/9I+&xsDx/ :7MVV|#2|CFd >>> lJz?Z)m1)2<7 >>> ohhu1foh3Eivah6Ohngo cothahquaiQuuogo6dei oba8ui7doh8eik0Ap4fe >>> jooReedi4huneo7Pohto oox7eix2paeShoo3kohh eiteash9footi7Cheequ >>> Ye9ka9uashoo6uYah8ei XohxeeC8paQueirielae aezol4ai0cahhaiCaeli >>> goh7phae4chaWo0U ieloo7ish1Ievooz NiyoosaePaghau4e eif1geeZuoth0eNg >>> PhishooshooYif9w neenahQu9ileesh2 ahMo2rooF3Faevei Ahqu7ukees1shool >>> Joocie9ge1aecang iew4po5eNgeetoce Thoh1iu6ief4ohVi Ohme5PhaeSho8uxe >>> eif1yei8 ietig0oo keif4eil dah5fafu bie3oshu saiviz1u ese1uec2 ietohbe3 >>> ahxizee4 aid1aek9 rohjugh2 eo1if3ph ohoh1uu8 dooz8ze6 nai9saeh aeking0z >>> ha4equie jae6iz2j noo8aeyu iech2jam ba0feech ohng6aer aa1eid0u yoh6paep >>> 21414 25410 12686 04946 11072 19016 26291 >>> 0176501025 2925313469 2932201624 >>> 1,5,13,17 1,8,16,20 4,5,13,17 2,7,15,19 >>> >>> >> >