Full Disclosure mailing list archives

Re: Google Chrome Browser Vulnerability


From: redb0ne () hush com
Date: Wed, 03 Sep 2008 15:01:55 -0400

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1



On Wed, 03 Sep 2008 14:47:22 -0400 n3td3v <xploitable () gmail com>
wrote:
On Wed, Sep 3, 2008 at 5:06 PM,  <Valdis.Kletnieks () vt edu> wrote:
I'd place bets that whoever it is, they're on the RBN payroll...


I thought a high ranking security professional like yourself would
stick to facts, not the latest disinformation handed out by so-
called
"trusted" security professionals. Marcus Sachs is good at it, Sans
is
good at it. We already know the CIA use Sans for it,
http://www.securityfocus.com/brief/666. Yet you continue to hang
out
with them on #dshield on Freenode. You are being led up a garden
path
by power hungry folks feeding the media news about anything they
can
orchestrate to ramp up cyber security as a national security
agenda
item as the next administration is coming in so they can become
more
powerful in Washington, yet you still trust them.

I'd like to see you provide some proof that this is
"disinformation" aside from your delusional
theories.

There has been plenty of proof that RBN is a real threat, if you
are going to try and call
people out on spreading misinformation, then you need to be
prepared to present a counter
argument proving it is disinformation. Otherwise all you are doing
is flapping your mouth off.
-----BEGIN PGP SIGNATURE-----
Note: This signature can be verified at https://www.hushtools.com/verify
Charset: UTF8
Version: Hush 3.0

wpwEAQMCAAYFAki+3yIACgkQGwcl4JwqQeAHagP/aRprRXQYDWWL6tFJ4Ee+QywkG+dZ
GV0HdSOUNQGEGdUygvtjIXztlRZuNza0/eSdDwaxDKoM2POCjpcRXoOfikA419S8XrqA
L7gFcL5Xn5I/NFO0sIhH/Co4gtlGdxe6nLNzCNc+8BS4rnf77cSJNGINQpkAfwxsYfiY
WnZB+yo=
=i1Ep
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Current thread: