I definitely noticed the second cert after the fact. I was looking around at the people in the room, and then Dan said something. I do not think Dan was trying to be malicious. I simply logged in to gmail via 3g and changed my password.
I did not think the topic of the meeting was wireless exploits, I had just walked in the room. Roger and I had brought holiday gifts via usb hard drives. I take no issue with discussing such topics in the group, I do enjoy the wireless exploits from time to time. I did not expect this surprise from someone in the group. If this is the topic everyone wants to talk about at meetings, don't let me encourage a sewing group. We had better all be on guard at every meeting from now on. I will bring more then a backtrack cd when I get bored. I am no angel. I have been reminded on more then one occasion that some of our members have included people in their office with our group and that I am to keep a certain level of professionalism in group activities. My issue is not with Dan practicing these techniques, it is with practicing these techniques on members of the group. Furthermore, with so many of our members holding professional associations in industry, I would have thought that many of these members would rather not be associated with people doing this to arbitrary folks in a coffee shop. Such activities are some of the top methods when performing identity theft. Chris... On Mon, Dec 29, 2008 at 6:09 PM, Fischer, Benjamin <[email protected]> wrote: >>I personally consider your actions inappropriate, and I have asked >>others here in a public forum on what they think. I don't expect > others >>to necessarily concur, and I am asking for their input. > > Well I already put a penny in so here is my second penny so that you get > my full 2 cents worth. > > First off I was not there so my opinion is purely based on the email > thread and maybe not worth much. If I was there and handed my personal > info I would not be very happy. But it would have been my own fault and > I would hope to learn from it. If there was someone there with > malicious intent you would be finding out the hard way. > > It may not have been the 'coolest' way to present it. But it is > something we all should be looking out for. > > Sometimes the best planned introduction is not received as planned... > > Confidentiality Note: > > The preceding e-mail message (including any attachments) contains information > that may be confidential, protected by applicable legal privileges, or > constitute non-public information. It is intended to be conveyed only to the > designated recipient(s). If you are not an intended recipient of this > message, please notify the sender by replying to this message and then delete > it from your system. Use, dissemination, distribution or reproduction of this > message by unintended recipients is not authorized and may be unlawful. > > > _______________________________________________ > LinuxUsers mailing list > [email protected] > http://socallinux.org/cgi-bin/mailman/listinfo/linuxusers > -- "As we open our newspapers or watch our television screens, we seem to be continually assaulted by the fruits of Mankind's stupidity." -Roger Penrose
