/Senate%20bill%20bans%20P2P%20networks/2100-1027_3
-524479
6.html?tag=techdirt
-
You are subscribed as [EMAIL PROTECTED]
To manage your subscription, go to
http://v2.listbox.com/member/?listname=ip
Archives at: http://www.intere
ed edits."
-- Geraldine Sealey
[08:25 PDT, June 22, 2004]
_______
FoRK mailing list
http://xent.com/mailman/listinfo/fork
- End forwarded message -
--
Eugen* Leitl http://leitl.org";>leitl
input can compute the MAC directly,
otherwise it's a one-time (for immobile nodes) operation at setup.
This is obviously of use for geographic routing in wireless
meshes, geographically constrained queries/broadcast, etc.
--
Eugen* Leitl http://leitl.o
http://www.skype.com/download_linux.html
FYI. Binary-only, of course.
--
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2
On Sun, Jun 20, 2004 at 06:24:35AM -0400, Gabriel Rocha wrote:
> On Jun 20 2004, Eugen Leitl wrote:
> | Anyone here using that device? With Sveasoft's firmware? Building the
> | firmware yourself, or using VPNs/IPsec?
>
> I have one here at work. Works wonder
a mailing list ([EMAIL PROTECTED] is largely
silent on crypto matters).
--
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 7
IFRAME: [4]pos6
References
1. mailto:[EMAIL PROTECTED]
2. http://www.novell.com/news/press/archive/2004/06/pr04040.html
3. http://www.openswan.org/
4. http://ads.osdn.com/?ad_id=2936&alloc_id=8587&site_id=1&request_id=584565
- End forwarded message -
--
Eu
n it but it's
still great. If you were a sophisticated criminal and you really wanted to
hide away, then you should probably not use something that is a commercially
closed source system such as Skype. I don't think this is an issue.
If the FBI or Europol came to
e a little up and down. Easy enough to improvise for cheap,
especially if you do it with a monster dish, which isn't at all like a truss
of a lightweight giant scope.
--
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07078
for a firmware worm, given that the hole is trivial to
exploit, Linux firmware build environments are aplenty, megaunits have been sold,
and most users aren't security-literate).
The first thing to do before even putting it on the network is
to reflash it, with Sveasoft's firmware, o
self."
-
You are subscribed as [EMAIL PROTECTED]
To manage your subscription, go to
http://v2.listbox.com/member/?listname=ip
Archives at: http://www.interesting-people.org/archives/interesting-people/
- End forwarded message -
--
Eugen* Leitl h
4 he was Chief Technology
Officer and Senior Vice President of the Product Group at Dell Computer
Corporation. As Senior VP, he was responsible for all product development
activities and, at various times, also responsible for product marketing,
manufacturing, procurement, information systems, an
or by
'surveillance vehicles.'"
IFRAME: [2]pos6
References
1.
http://www.rfidnews.org/news/2004/06/10/rfidenabled-license-plates-to-identify-uk-vehicles/
2. http://ads.osdn.com/?ad_id=2936&alloc_id=8587&site_id=1&request_id=648523
- End forwarded mes
the people at large is that they
be properly armed." --Alexander Hamilton
-
You are subscribed as [EMAIL PROTECTED]
To manage your subscription, go to
http://v2.listbox.com/member/?listname=ip
Archives at: http://www.interesting-people.org/archives/i
.
Ramer, the Florida agent, said the scoring system was scrapped because
it was "really specific to 9/11," and not applicable for everyday use.
Also, he said, "we didn't want anybody abusing it."
Seisint is a Boca Raton, Fla., company founded by a
acy of your home should be the least of your
worries.
> switches under each key) are vulnerable to this attack. It is pretty noisy, I
> can imagine that the noise of each key's switch is sufficiently different (due
> to wear, etc) that it would still work with modifications.
--
ists
http://zgp.org/mailman/listinfo/linux-elitists
----- End forwarded message -
--
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7
rst question, I'd like you
to explain why the Senate's RFID scanner indicates that you walked
in here with a cheese grater, a copy of the latest Harry Potter
video, a forklift, and the latest issue of 'Motorcycle Babes' on
your person."
----- End forwarded message -
r presence and directory services, and
each client that runs non-NATted can transparently act as reflector
supporting NATted users. Plus, all this (including, besides voice,
text-based instant messaging) works with zero configuration with an
idiotproof UI.
Enzo
----
, and increasing the cross connectivity of
the network (local pooling of resources).
Posted by John Robb on 07.05.2004 at 09:50 AM | Permalink
___
FoRK mailing list
http://xent.com/mailman/listinfo/fork
----- End forwarded message
in some
capacity, Juarez said. "The investment is high in this," he added. "It's in
an important realm."
Microsoft announced the NGSCB plans for Longhorn at WinHEC 2003 and released
NGSCB code in the Longhorn Developer
_
FoRK mailing list
http://xent.com/mailman/listinfo/fork
- End forwarded message -
--
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07078, 11.61144http://www.lei
Gail Bracy
"If I take my medication, my bad uncle stays in Yonkers." - Law and Order.
-
You are subscribed as [EMAIL PROTECTED]
To manage your subscription, go to
http://v2.listbox.com/member/?listname=ip
Archives at: http://www.interesting-people
oo! Groups Links
<*> To visit your group on the web, go to:
http://groups.yahoo.com/group/transhumantech/
<*> To unsubscribe from this group, send an email to:
[EMAIL PROTECTED]
<*> Your use of Yahoo! Groups is subject to:
http://docs.yahoo.com/in
om this group, send an email to:
[EMAIL PROTECTED]
<*> Your use of Yahoo! Groups is subject to:
http://docs.yahoo.com/info/terms/
- End forwarded message -
--
Eugen* Leitl http://leitl.org";>leitl
__
ICB
hardware is being seized
(threat model=knuckle-dragger/gumshoe)?
I presume people don't yet scan for remote machines on wireless networks,
too.
--
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07078, 11.61144
pe people will only wind up with a glob of useless bits.
Assuming the knuckle-draggers will know a CFS from a corrupted FS or a dead
drive, that is.
--
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07078, 11.61144
hat law, and so a crime in itself.
Are you truly expecting a worldwide ban on encryption? How do you prove
somebody is using encryption on a steganographic channel?
--
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07078, 11.6
n current technology to understand what the
fuck I'm talking about. It doesn't matter on the long run.
--
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE:
ttp://projects.sqrville.org/staticpages/index.php?page=padlocksl-linux-howt
9.
http://ads.osdn.com/?ad_id=2872&alloc_id=7019&site_id=1&request_id=414783&op=click&page=%2farticle%2epl
----- End forwarded message -
--
Eugen* Leitl http://leitl.org";>leitl
nd Internet communications. They are
fed with diverse pieces of information. If you don't know what to look for,
everything seems to be the same color and there's no way to select between
the legal and the illegal. But if you know where to start, it becomes
simpler."
Kandel offers an exampl
tml
6. http://locustworld.com/media/timesbusiness290104.gif
7. http://locustworld.com/siprouting.php
8.
http://ads.osdn.com/?ad_id=2872&alloc_id=7019&site_id=1&request_id=7791007&op=click&page=%2farticle%2epl
- End forwarded message -
--
Eug
farticle%2epl
- End forwarded message -
--
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
http://moleculard
s.gov/dhspublic/display?content=3163
- End forwarded message -
--
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F
nexus of fiber, copper, or rights-of-way must exist within or proximal to
the user community, and it must be open and accessible to those companies
which wish to add to or improve upon those facilities.
I conced you the point that nexus might be not a common term of the trade.
But it's certainl
estion of censorship had not been
clearly thought through.
"Once you build the technology to break censorship, you've broken censorship
- even of the things you want censored," said Mr Thompson.
"Saying you can then control some parts of it, like images of chil
t's much more like biology.
Biology is subject to physics. At all scales. When it comes to communication,
constraints on energy and signalling and shape become especially obvious.
Computational physics is just such a source of constraints. Except, here
energy is not (yet) a constraint (dissipation
On Fri, Apr 09, 2004 at 06:22:06PM +0100, Jim Dixon wrote:
> On Fri, 9 Apr 2004, Eugen Leitl wrote:
>
> > Internet is mostly a tree (if you look at the connectivity maps).
>
> Not at all. A tree has a root; the Internet doesn't have one. Instead
> you have several t
tal emitters,
or are there specific optimal radiator geometries?
--
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
orted.
Everyone has seen http://www.skype.com/download_pda.html
right?
--
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443
o inorganic detonators.
Besides, the chemist is not the courier. This will only catch the amateurs.
--
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A
subscription, go to
http://v2.listbox.com/member/?listname=ip
Archives at: http://www.interesting-people.org/archives/interesting-people/
- End forwarded message -
--
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07078, 11.611
http://www.linux.ie/pipermail/ilug/2004-April/013049.html
[ILUG] [Fwd: I fought the scammer... and I won.]
John Allman allmanj at houseofireland.com
Mon Apr 5 09:33:39 IST 2004
* Previous message: [ILUG] bringing users to Linux (RFC)
* Next message: [ILUG] [Fwd: I fought the scammer... a
mily friend said Mahboob Khawaja is "a
normal guy." "I didn't see him as a fanatic or anything," said Mohamed Farhat
Mehdi. He said that his friend often spoke of his family in Ottawa and "he
talks with his Internet quite often."
--
Eugen* Leitl http://leitl
http://story.news.yahoo.com/news?tmpl=story&cid=562&ncid=738&e=3&u=/ap/20040403/ap_on_hi_te/tax_data_mining
2.
http://ads.osdn.com/?ad_id=2866&alloc_id=7029&site_id=1&request_id=1987911&op=click&page=%2farticle%2epl
----- End forwarded message -
wrong expertises. Some people even
explicetely confirmed that my dissertation is correct and the
expertises are wrong. This just doesn't matter in any way.
Isn't that spooky? What kind of business is cryptography?
regards
Hadmut
-
The
emops
- End forwarded message -
--
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
http://molecula
;op=click&page=%2farticle%2epl
- End forwarded message -
--
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F
?ad_id=2683&alloc_id=6523&site_id=1&request_id=3326894&op=click&page=%2farticle%2epl
- End forwarded message -
--
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07078, 11.61144http://www.le
tive devices probably could.
This is very likely.
--
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
http://moleculard
m body (very likely with a RFID as well) in Germany, and biometrics
(EU-wide, but
quite likely to interoperate with NA and other usual suspects).
Business as usual, in other words, with zero awareness on the side of the
governed.
--
ttp://zgp.org/mailman/listinfo/p2p-hackers
___
Here is a web page listing P2P Conferences:
http://www.neurogrid.net/twiki/bin/view/Main/PeerToPeerConferences
----- End forwarded message -
--
Eugen* Leitl http://leitl.org";>leitl
___
Should it happen, upgrading to a web of trust is always an option.
--
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 77
adation, using a simple patch.
If it doesn't fit these minimal requirements, it will die, just the same way
FreeS/WAN did.
-- Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F
, to a PDA) and perhaps
slower propagation (?).
Comments, as I said, are much welcome.
Enzo
___
p2p-hackers mailing list
[EMAIL PROTECTED]
http://zgp.org/mailman/listinfo/p2p-hackers
__
://news.com.com/2100-7352-5137344.html?tag=nl
- End forwarded message -
-- Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29
ial terrorist threats in order to
qualify for the federal largesse," Dreyfuss wrote. "In each city and
county local police were required to identify up to fifteen groups or
individuals called potential threat elements (PTEs). The Justice
Department helpfully points out that the moti
could. Isn't
part of Pd envelope goal establishing a tamper-proof compartment? We know Pd
is evil, but once hardware support is everywhere, one can as well use it for
something positive, for a change.
-- Eugen* Leitl http://leitl.org";>leitl
___
On Sun, Mar 07, 2004 at 01:26:47AM +1300, Peter Gutmann wrote:
> Eugen Leitl <[EMAIL PROTECTED]> writes:
>
> >"A way that works" would involve passphrase-locked keyrings, and forgetful
> >MUAs (this mutt only caches the passphrase for a preset time).
>
if taken together with other modes of filtering,
though.
> This is just another variation of the "To secure the Internet, build a big
> wall around it and only let the good guys in" idea.
-- Eugen* Leitl http://leitl.org";>leitl
_
omebody picks up the torch and keeps it
> burning, possibly even brighter.
Is there a protocol flaw in IPsec which prevents it from going OE as StartTLS
does?
-- Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07078, 11.61144
Can we demime the mails on this node?
- Forwarded message from Eugen Leitl <[EMAIL PROTECTED]> -
From: Eugen Leitl <[EMAIL PROTECTED]>
Date: Tue, 2 Mar 2004 16:40:21 +0100
To: Thomas Shaddack <[EMAIL PROTECTED]>
Cc: [EMAIL PROTECTED]
Subject: Re: [Users] Announce:
of an innocent
person being in the wrong place at the wrong time, of having rented the
wrong apartment ... or having a name similar to the name of some bad guy,"
he said.
-----
You are subscribed as [EMAIL PROTECTED]
To manage your subscription, go to
ument
storage -- it isn't, but it will be there, by the time the threat becomes
global. At that point a society has to make a watershed decision, whether
it's going police state, or will protect pockets of privacy.
So, no, I'm not over-worried yet.
-- Eugen* Le
In theory, yes.
> How would look a good, decentralized structure for allowing pseudonymous
> IP stream "broadcast" with minimal resources, the ultimate Internet Pirate
> Radio station?
Lag is no problem, but QoS is. I'm not sure traffic
h.org/)
-
You are subscribed as [EMAIL PROTECTED]
To manage your subscription, go to
http://v2.listbox.com/member/?listname=ip
Archives at: http://www.interesting-people.org/archives/interesting-people/
- End forwarded message -
-- Eugen* Leitl http://le
hnologies in Las Vegas, which showcases hi-tech products
developed for use in the fight against terror.
Story from BBC NEWS:
http://news.bbc.co.uk/go/pr/fr/-/1/hi/technology/3430987.stm
Published: 2004/01/30 09:04:35 GMT
-- Eugen* Leitl http://leitl.org";>leitl
_
your subscription, go to
http://v2.listbox.com/member/?listname=ip
Archives at: http://www.interesting-people.org/archives/interesting-people/
- End forwarded message -
-- Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07078,
bly About Security in an Uncertain
World" (Copernicus Books, 2003).
-
You are subscribed as [EMAIL PROTECTED]
To manage your subscription, go to
http://v2.listbox.com/member/?listname=ip
Archives at: http://www.interesting-people.org/archives/interesting-p
).
No doubt such capabilities are reserved for cyberwar and industrial
espionage.
P.S. Sorry about the MIME sig screwup. I forgot.
-- Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07078, 11.61144http://www.leitl.org
-
You are subscribed as [EMAIL PROTECTED]
To manage your subscription, go to
http://v2.listbox.com/member/?listname=ip
Archives at: http://www.interesting-people.org/archives/interesting-people/
- End forwarded message -
-- Eugen* Leitl http://leitl.org";>leit
I suppose it's the signature; let's see what happens...
On Wed, Jan 28, 2004 at 02:30:15PM +0100, Eugen Leitl wrote:
> Now that was weird. Sorry for this post; testing. On Wed, Jan 28, 2004
> at 02:21:24PM +0100, Eugen Leitl wrote: > By refusing to tell you reveal
> you&
manage your subscription, go to
http://v2.listbox.com/member/?listname=ip
Archives at: http://www.interesting-people.org/archives/interesting-people/
- End forwarded message -
-- Eugen* Leitl http://leitl.org";>leitl
__
I
Would you kindly STFU now. Talk about crypto, your politics is flat-EEG.
On Mon, Dec 22, 2003 at 09:20:35AM -0800, James A. Donald wrote:
> --
> James A. Donald:
[demime 0.97c removed an attachment of type application/pgp-signature]
7;s the hand out you're looking for:
>
> http://www.mail-archive.com/faq.html#newlist
A redundant archive is a good idea. Thanks.
-- Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07078, 11.61144
m a cypherpunk point of
view. Let one list subscriber read it, and filter relevant bits to the
newsticker.
If it's a steaming pile of crap for Tim May it doesn't mean it's useless for
everybody else.
-- Eugen* Leitl http://leitl.org";>leitl
personalities realize that what they really want is a forum for
> blogging their message to an attentive audience.
-- Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8
n. Very few
> consumers here.
"To see the collection of prior postings to the list, visit the cpunx-news
Archives. The current archive is only available to the list members."
No good. Please fix.
-- Eugen* Leitl http://leitl.org";>leitl
he remailer software is
and whether remailer machines get more frequently compromised than
comparable machines.
Ingress/egress points into nodes are potentially subject to traffic analysis
and interception of egressing cleartext.
I'm not sure anyone is giving a damn, though.
-- Eugen* Leitl
a habit, but my Mailman isn't working yet, and I don't
have time to debug the setup to resurrect cpunx-news.
-- Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 0
choen/ | being programmed by others.
http://vitanuova.loyalty.org/ | -- Fred Rogers (1928-2003),
|464 U.S. 417, 445 (1984)
___
linux-elitists
http://zgp.org/mailman/listinfo/linux-elitists
- End forwarde
etitive advantage out of this thing I'm
designing to make up for all the pirated software and stolen music and
annoying competitors I've had to put up with in the past.
--
- Jason Last known location: 2.5 miles northwest of MOUNTAIN VIEW, C
http://www.loyalty.org/~schoen/ | being programmed by others.
http://vitanuova.loyalty.org/ | -- Fred Rogers (1928-2003),
|464 U.S. 417, 445 (1984)
___
linux-elitists
http://zgp.org/mailma
http://www.cryptophone.de/html/downloads_en.html
-- Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F
Can somebody with a webspider crawl these documents, and put it up
on the web?
http://www.whitehouse.gov/robots.txt
-- Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07078, 11.61144http://www.leitl.org
medium
itself that it's in decline.
Both IRC and IM are of course even worse content killers than email.
-- Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE:
k, 1922).
16. The views expressed in this essay do not necessarily represent the
views of the National Science Foundation or the United States.
The author is in the Division of Information and Intelligent Systems, the
Directorate for Computer and Information Science and Engineering, National
Science F
are subscribed as [EMAIL PROTECTED]
To manage your subscription, go to
http://v2.listbox.com/member/?listname=ip
Archives at: http://www.interesting-people.org/archives/interesting-people/
- End forwarded message -
-- Eugen* Leitl http://leitl.org";>leitl
__
Computer Science and Information Management,
> UC Berkeley
>Hal Varian, School of Information Management and Systems
> and Economics
> Dept., UC Berkeley
-
You are subscribed as [EMAIL PROTECTED]
To manage your subscription, go to
t right.
>
>But I do like the thought of a p2p journal!
___
p2p-hackers mailing list
[EMAIL PROTECTED]
http://zgp.org/mailman/listinfo/p2p-hackers
___
Here is a web page listing P2P Conferences:
htt
F.net email is sponsored by: SF.net Giveback Program.
Does SourceForge.net help you be more productive? Does it
help you create better code? SHARE THE LOVE, and help us help
YOU! Click Here: http://sourceforge.net/donate/
___
mnet-devel mailing list
[
__
mnet-devel mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/mnet-devel
- End forwarded message -
-- Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07078, 11.61144
ociates slid
5.44 percent to $13.03, Symantec Corp. dropped 7.13 percent to $61.35, and
Trend Micro gained 3.43 percent to close at $24.41.
E-mail David R. Baker at [EMAIL PROTECTED]
-- Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 4
sts during protests.
A spokesperson told BBC News Online they were "not prepared to discuss
matters of security".
Although it "would be extremely unusual to do that, and authority would
have to be cleared with all the appropriate regulators."
--
((Udhay Shankar N)) ((udhay
stanford.edu
Distributed poC TINC:
Jay Sulzberger <[EMAIL PROTECTED]>
Corresponding Secretary LXNY
LXNY is New York's Free Computing Organization.
http://www.lxny.org
___
linux-elitists
http://zgp.org/mailman/listinfo/linux-e
http://news.google.com/news?q=ntk.org
NEED TO KNOW
THEY STOLE OUR REVOLUTION. NOW WE'RE STEALING IT BACK.
Archive - http://www.ntk.net/
Unsubscribe or sub
r BitKeeper machine was not broken
into and their code was not changed. So it's arguable whether the
change, which was caught within 24 hours, constituted changing the
Linux kernel. I would argue no.
http://slashdot.org/article.pl?sid=03/11/06/058249
and I'm told that this coverag
ernel "Back Door" Attempt
This attack has only made the mainstream media in one place, so far:
http://www.smh.com.au/articles/2003/11/07/1068013371170.html
Bid to backdoor Linux kernel detected - smh.com.au
This is a pity, because I think this
`-'
___
FoRK mailing list
http://xent.co
ssues with it[2]
[1]http://www.theregister.co.uk/content/39/33769.html
[2]http://www.securityfocus.com/bid/8912
-- Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07078, 11.61144 http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B0
401 - 500 of 659 matches
Mail list logo