1. i know of a case of a very eastern country receiving threats after they 
broke a billion dollar metamphetamine ring hosted in a country in middle east . 
their emails had signs , through the sighs ME investigators found the group and 
sent back the judiciary report to the original country . in many ancient 
colonies , having a sign or contact produced sort of unity , direction , help , 
alerts , recruitment and announcements . later in more modern societies that 
had secret cults , signs were continuing to be elements of existence , secret 
message broadcast where secret channel is unavailable and alike .  

nowadays , such behavior , to me understanding is just enjoying a bit of "catch 
me if you can" , although being a dark phsyc op shouldn't be ruled out 
immediately . in mentioned case , i believe the later is the case .

2. take a look at any crypto book under "Birthday Attack" .

Regards
M


On Friday, July ۱۴, ۱۳۹۱ at ۳:۴۹, DarkPassenger wrote:

> good to know a brother ( if you are a sister , drop me a private line 
> IMMEDIATLY :D ) is already pushed the recently famous 
> c5e2b30053762c2984d26b84748c59fc up for crack at Fri 31st Aug,2012 10:40 pm . 
> as a civilian i assume like me he does not know much about terrorism so he is 
> curious to find a way to contact and setup a meet with some nice talented 
> guys for a drink and Hooka session , but i want to make one educated step 
> before and know a thing or two before that . following are the questions :
>  
> 1. from experienced cyber terrorists out there : do you think md5ing a 
> contact is a good idea ? of course i am not asking anybody lessons on number 
> crunching . Q is aiming at the cyber terror side of the issue . all due 
> respects , is mid5ing your contact is a common cyber Soprano practice ? if 
> yes i would like to see a pastebin of any data related to similar behavior in 
> the past . its for real , not playing Bruno for Hezbollah and Mossad guys so 
> do not disappoint me  
>  
> 2. from crypto guys : are there methods for md5 and sha1 to guarantee that a 
> certain hash will not produced out no matter what input? is having such 
> requirement , a part of definition and certifying a serious hash algo or the 
> question is totally irrelevant?
>  
>  
> "- going out ?
> - we all are . act accordingly"
>  
>  
> _______________________________________________
> Dailydave mailing list
> [email protected] (mailto:[email protected])
> https://lists.immunityinc.com/mailman/listinfo/dailydave
>  
>  


_______________________________________________
Dailydave mailing list
[email protected]
https://lists.immunityinc.com/mailman/listinfo/dailydave

Reply via email to