Dailydave mailing list archives

Re: how i contacted cyber terrorists


From: Mh <mhtajik () gmail com>
Date: Tue, 16 Oct 2012 05:02:51 +0330

1. i know of a case of a very eastern country receiving threats after they broke a billion dollar metamphetamine ring 
hosted in a country in middle east . their emails had signs , through the sighs ME investigators found the group and 
sent back the judiciary report to the original country . in many ancient colonies , having a sign or contact produced 
sort of unity , direction , help , alerts , recruitment and announcements . later in more modern societies that had 
secret cults , signs were continuing to be elements of existence , secret message broadcast where secret channel is 
unavailable and alike .  

nowadays , such behavior , to me understanding is just enjoying a bit of "catch me if you can" , although being a dark 
phsyc op shouldn't be ruled out immediately . in mentioned case , i believe the later is the case .

2. take a look at any crypto book under "Birthday Attack" .

Regards
M


On Friday, July ۱۴, ۱۳۹۱ at ۳:۴۹, DarkPassenger wrote:

good to know a brother ( if you are a sister , drop me a private line IMMEDIATLY :D ) is already pushed the recently 
famous c5e2b30053762c2984d26b84748c59fc up for crack at Fri 31st Aug,2012 10:40 pm . as a civilian i assume like me 
he does not know much about terrorism so he is curious to find a way to contact and setup a meet with some nice 
talented guys for a drink and Hooka session , but i want to make one educated step before and know a thing or two 
before that . following are the questions :
 
1. from experienced cyber terrorists out there : do you think md5ing a contact is a good idea ? of course i am not 
asking anybody lessons on number crunching . Q is aiming at the cyber terror side of the issue . all due respects , 
is mid5ing your contact is a common cyber Soprano practice ? if yes i would like to see a pastebin of any data 
related to similar behavior in the past . its for real , not playing Bruno for Hezbollah and Mossad guys so do not 
disappoint me  
 
2. from crypto guys : are there methods for md5 and sha1 to guarantee that a certain hash will not produced out no 
matter what input? is having such requirement , a part of definition and certifying a serious hash algo or the 
question is totally irrelevant?
 
 
"- going out ?
- we all are . act accordingly"
 
 
_______________________________________________
Dailydave mailing list
Dailydave () lists immunityinc com (mailto:Dailydave () lists immunityinc com)
https://lists.immunityinc.com/mailman/listinfo/dailydave
 
 


_______________________________________________
Dailydave mailing list
Dailydave () lists immunityinc com
https://lists.immunityinc.com/mailman/listinfo/dailydave

Current thread: