On Sat, 01 Oct 2011 09:16:11 +1000, xD 0x41 said:
> As you also said, murder is a no brainer in any place...well, maybe not iraq
> or afghanistan just yet :P lol..
Iraq, for all its problems, is still a place with a somewhat functional
judicial system. The court system may be broken, but you in g
On Thu, 29 Sep 2011 23:55:18 +1000, xD 0x41 said:
> there are KNOWN places, i have used, and known places wich will not store
> data, or maybe, provide a proxxy but, they can certainly hide a botnet...
As far as you know... :)
> ONLy people who commit ANY crime in THEYRE country, will be arreste
precisely why i did not screrw with peoples things and thx for poiting this
out.
Providers that steal other peoples hacks don't last long in the
underground. People take that personally :)
This is a BIG reason why, i did not, nor my coadmin, touch things, unless we
were invited to, and, never eve
On 9/30/2011 11:59 AM, adam wrote:
> "Cause them to face punishment in what country? Wouldn't they have to
> extradite them? What if their extradition treaty didn't cover
> cybercrime, or they didn't have one with the US?"
>
> I'm not sure you understood the example, and the mixing and matching
> y
"Cause them to face punishment in what country? Wouldn't they have to
extradite them? What if their extradition treaty didn't cover cybercrime, or
they didn't have one with the US?"
I'm not sure you understood the example, and the mixing and matching you're
doing here doesn't really work. If they'
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 9/30/2011 9:46 AM, Paul Schmehl wrote:
> IOW, there is no honor among thieves.
>
> This isn't a new concept.
>
> --On September 30, 2011 3:31:06 PM +0100 Darren Martyn
> wrote:
>
>> By screw you over I did not intend to mean "sell you out". I mea
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 9/30/2011 10:45 AM, adam wrote:
> "User location determines Judicial Jurisdiction - how is that irrelevant?"
>
> Jurisdiction in the prosecution of such crimes, yes. In the
investigation itself, no. Which seems to be where all the confusion is
com
"User location determines Judicial Jurisdiction - how is that irrelevant?"
Jurisdiction in the prosecution of such crimes, yes. In the investigation
itself, no. Which seems to be where all the confusion is coming from. If you
use a service in the US to commit a crime, and that service is ordered b
IOW, there is no honor among thieves.
This isn't a new concept.
--On September 30, 2011 3:31:06 PM +0100 Darren Martyn
wrote:
> By screw you over I did not intend to mean "sell you out". I meant a more
> criminal fucking over - where they backdoor the box (Hey, physical access
> and its THEIR
Dude, If you really want to be 'invisible' this is not hard todo..
if you expect to, jump around on peoples servers, illegally, for long
amounts of time, ie, daily/wekly/yearly,and are a pest, who would want to
make you or help you even be invisible.
there are KNOWN places, i have used, and known p
indeed :)
but, it is how a proper anon person would operate, well, tht is how i once
did...
anyhow, it is to broad, and, yes, i qwould never believe in bulletproof,
unless i have used it maybe, for 10yrs, thru 10 botnets ;P wich, is very
rare but funnily, possible.
webhosters, are even more corrupt
err, you are limited in those countries dude... id really checkup on that
... maybe some but, yea i agree, i dont think any hosting is anon, but, i
sure know i have kept an anon dedis in past, and was VERY easy to avoid
handing anything over. Unless they had personally seized from my company, i
was
They advertised as anonymous VPN to 'everyone'.
Then, that would mean, especially NOT locally, thats something wich is also,
subject to federal laws though so, in its own country, the provider may have
to, nomatter whats advertised, BUT outside of country customers, should not
be handed over.
isp's
== DeepSec In-Depth Security Conference 2011 "High Five" ==
The fifth DeepSec In-Depth Security Conference is taking place between
15th and 18th November 2011 at the Imperial Riding School Renaissance
Hotel in Vienna, Austria.
DeepSec 2011 features 0talks and 0tools never presented or published b
Curso Basico de penetration testing, veremos como realizar un pentest de
forma dinamica y los conceptos de testeos de intrusion
Temario:
1- Negocio y logistica del testeo de intrusion
2- Obteniendo informacion
3- Reconocimiento del ambiente
4- Practica en vivo de vulnerability assesment
Se entr
15 matches
Mail list logo