Date: Thu, 20 Mar 2014 08:38:43 -0700 From: coderman <coderman@...il.com> To: oss-security@...ts.openwall.com Subject: Re: FD mailing list died. Time for new one (or something better!) specifically you are building hardened, reproducible pkgs/isos from snapshots of - live Qubes OS for baremetal layer - tails, whonix, kali, arch, ramfsonly variants, exotics per all reqs - ENTROPY DONE RIGHT, END TO END, FROM DEVELOPER COMMITS TO RUNTIME GUESTS ^this is capitalized because after decades of seeding crypto laughbly wrong, we're still routinely making laughably wrong seeds, everywhere... i am getting desperate! ,see also: http://blog.cryptographyengineering.com/2014/03/how-do-you-know-if-rng-is-working.html - the bootstrap client is built for native platforms to retrieve over various means for linux32, linux64, osx32, osx64, win32, win64, android, iOS, windows mobile which deploys the hardened bare metal systems with scrutinized builds above OH: "duuuuude, don't do it. no. don't. no no no." 'cmon, :) how long have you wanted to see a nice weaponized pre-auth ssl+escalate drop? :) :) :)' "not funny! these are operations nightmares you fucker!" Q: "I heard infosec is dead. the citation was infosuck as definitive. #oldtimers and stuff" A: i don't know shit, but one thing i do know is: if your hacker peer group is this bad and/or one of the 1:4 malicious entrapping snitches and/or ALL got v8nd doing stupid shit while high on stupid shit making stupid judgement calls and/or otherwise failed to be decent humans - then you're doing it wrong! good news it is not too late to make good friends and get over your bullshit ;) [in all seriousness, it's an amazing time to be alive! the unappreciated work that is being done is everywhere if you make an effort to seek it out.] Q: "How big could such a bounty/bet get?" A: if i was the CIA i would take the snowden docs that are eventually after 42 years or so disseminated in full and dump them to the hidden fuller disclosure. drop a few TAO 0day expected to lose utility on the list as false flag. use it to grind some axes through SUBQUANTUMSQUIRRELMESH cover and use pilfered bounty to bet against the opers driving "perceived risk of running hidden site" to level 'wutsohigh'. then i'd use black funds stoking social media fire storm, the righteous furor pre-disposing the public to zero sympathy for what follows. nulling the meatbags simple as identities strategically leaked for hidden disclosure service operators to "lower american clandestine chemical cleaners" for prompt chemical dissolution. the subsequent narco pulp tie up bolsters pre-seeded notions that said "criminal hacker terrorists working for foreign intelligence services conspiring to kill americans with logic bombs thrown from darknet intertubes" deserved righteous death by sword clearly, if not for this narco deal then surely for <insert 3-5 favorite fad horsewomen here for straw beating>. finally, having driven the bounty on the hidden disclosure service to an absurd level twice the GDP of china, i would dump and mix the coins to a hidden wallet and disappear into history, never to be seen or heard from again. TL;DR: the pot could be twice the GDP of china if the CIA is playing the game with us and feeling extra dirty. [ 35 yrs later: the fact this was an exceptionally compartmentalized black op is quietly noted along with a few hundred thousand other arcane dumps no once cares about anymore... also un-noted: this operation was 100% sucessful in scaring all the fear cowed whitehats, grayhats, blackhats and inbetween from ever thinking about operating a truly fully disclosing forum for communication in the modern world. times have changed you hacker punks! ] Q: "When I asked if this could get any further off-topic, I was lamenting - not challenging!" A: hey, i'm not the one who is slacking on the disclosure of the hidden disclosure service! i just expand the anonymity set here... FIN: really done on this subject. if you're actually curious and willing to volunteer time and testing, go off-list and on-crypto :) https://peertech.org/files/0x65A847E7C2B9380C-pub.txt current OTR 157B7040 4339EFCA D83EF33D 7064F401 843A7E98 https://peertech.org/files/otr.txt View attachment "0x65A847E7C2B9380C-pub.txt" of type "text/plain" (3264 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.