On Wed, Jul 10, 2013 at 08:00:03PM -0400, Tom Ritter wrote:
On 10 July 2013 09:43, Jacob Appelbaum ja...@appelbaum.net wrote:
Andreas Bader:
Tens of thousands zero-days; that sounds like totally shit. That
guy seems to be a script kiddie poser, nothing more.
Are there any real hackers
Eugen Leitl:
Grimes: How many exploits does your unit have access to?
Cyber warrior: Literally tens of thousands -- it's more than that. We have
tens of thousands of ready-to-use bugs in single applications, single
operating systems.
Grimes: Is most of it zero-days?
Cyber warrior:
On Wed, Jul 10, 2013 at 11:03:50AM +, Andreas Bader wrote:
Tens of thousands zero-days; that sounds like totally shit. That guy
seems to be a script kiddie poser, nothing more.
Are there any real hackers that can issue a competent statement to that?
See http://blog.fefe.de/
--
Too many
Andreas Bader:
Eugen Leitl:
Grimes: How many exploits does your unit have access to?
Cyber warrior: Literally tens of thousands -- it's more than that. We have
tens of thousands of ready-to-use bugs in single applications, single
operating systems.
Grimes: Is most of it zero-days?
truth.
gpg --keyserver pgp.mit.edu --search-keys
EEE5A447http://pgp.mit.edu:11371/pks/lookup?search=0xEEE5A447op=vindex
Date: Wed, 10 Jul 2013 13:43:01 +
From: ja...@appelbaum.net
To: liberationtech@lists.stanford.edu
Subject: Re: [liberationtech] In his own words: Confessions
On 07/10/2013 04:45 AM, Eugen Leitl wrote:
http://www.infoworld.com/print/66
In his own words: Confessions of a cyber warrior
By Roger A. Grimes
Created 2013-07-09 03:00AM
Much of the world is just learning that every major industrialized nation has
a state-sponsored cyber army
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 07/10/2013 08:08 AM, Eugen Leitl wrote:
See http://blog.fefe.de/
*** Agreed, that seems to be a PsyOp to scare hackers away from the US
State secrets, or hire young kids. Very badly done though.
If that super elite guy is so meticulous
Jacob Appelbaum:
Andreas Bader:
Eugen Leitl:
Grimes: How many exploits does your unit have access to?
Cyber warrior: Literally tens of thousands -- it's more than that. We have
tens of thousands of ready-to-use bugs in single applications, single
operating systems.
Grimes: Is most of it
On Wed, Jul 10, 2013 at 4:43 PM, Jacob Appelbaum ja...@appelbaum.net wrote:
I couldn't disagree more. This sounds consistent with the current arms
race and also relates directly to the 0day markets that have been active
for many many years. Remember though: buying 0day bugs or exploits for
1. The NSA center of excellence program is not really that
important. If you look carefully, they are mainly 2 year
community colleges located near Army bases that give
basic sysadmin training. This is good and necessary, but
don't get fooled into thinking that they are training
the highly skilled
On 10 July 2013 09:43, Jacob Appelbaum ja...@appelbaum.net wrote:
Andreas Bader:
Tens of thousands zero-days; that sounds like totally shit. That guy
seems to be a script kiddie poser, nothing more.
Are there any real hackers that can issue a competent statement to that?
I couldn't disagree
On Wed, Jul 10, 2013 at 6:46 PM, Maxim Kammerer m...@dee.su wrote:
On Wed, Jul 10, 2013 at 4:43 PM, Jacob Appelbaum ja...@appelbaum.net
wrote:
I couldn't disagree more. This sounds consistent with the current arms
race and also relates directly to the 0day markets that have been active
On Thu, Jul 11, 2013 at 2:28 AM, Richard Brooks r...@acm.org wrote:
1. The NSA center of excellence program is not really that
important. If you look carefully, they are mainly 2 year
community colleges located near Army bases that give
basic sysadmin training. This is good and necessary, but
On Thu, Jul 11, 2013 at 3:22 AM, Shava Nerad shav...@gmail.com wrote:
So perhaps the journalist is giving you as the reader a little credit for
reading between the lines, intelligently (that being the root of the word:
inter for between, and legens for reading), to figure out what exactly you
On Wed, Jul 10, 2013 at 5:00 PM, Tom Ritter t...@ritter.vg wrote:
... if the tens of
thousands figure included 'soft targets':
[lots of soft targets...]
...Then I could see a tens of thousands figure. But if someone said
they had more than, say, 250 completely distinct, weaponized exploits
On Wed, Jul 10, 2013 at 5:58 PM, Maxim Kammerer m...@dee.su wrote:
... He would learn about backdoors in encryption
equipment by ordering their manuals? Where from, exactly, would he
order such classified material?
i'm not defending this individual specifically, but this is not at all
16 matches
Mail list logo