[prev in list] [next in list] [prev in thread] [next in thread]
List: dailydave
Subject: Re: [Dailydave] how i contacted cyber terrorists
From: Mh <mhtajik () gmail ! com>
Date: 2012-10-16 1:44:51
Message-ID: F1D7A89CFE424C58B2B7BCF28F7F474C () gmail ! com
[Download RAW message or body]
[Attachment #2 (multipart/alternative)]
1. i know of a case of a very eastern country receiving threats after they broke a \
billion dollar metamphetamine ring hosted in a country in middle east . their emails \
had signs , through the sighs ME investigators found the group and sent back the \
judiciary report to the original country . in many ancient colonies , having a sign \
or contact produced sort of unity , direction , help , alerts , recruitment and \
announcements . later in more modern societies that had secret cults , signs were \
continuing to be elements of existence , secret message broadcast where secret \
channel is unavailable and alike .
nowadays , such behavior , to me understanding is just enjoying a bit of "catch me if \
you can" , although being a dark phsyc op shouldn't be ruled out immediately . in \
mentioned case , i believe the later is the case .
2. take a look at any crypto book under "Birthday Attack" .
Regards
M
On Friday, July ۱۴, ۱۳۹۱ at ۳:۴۹, DarkPassenger wrote:
> good to know a brother ( if you are a sister , drop me a private line IMMEDIATLY :D \
> ) is already pushed the recently famous c5e2b30053762c2984d26b84748c59fc up for \
> crack at Fri 31st Aug,2012 10:40 pm . as a civilian i assume like me he does not \
> know much about terrorism so he is curious to find a way to contact and setup a \
> meet with some nice talented guys for a drink and Hooka session , but i want to \
> make one educated step before and know a thing or two before that . following are \
> the questions :
> 1. from experienced cyber terrorists out there : do you think md5ing a contact is a \
> good idea ? of course i am not asking anybody lessons on number crunching . Q is \
> aiming at the cyber terror side of the issue . all due respects , is mid5ing your \
> contact is a common cyber Soprano practice ? if yes i would like to see a pastebin \
> of any data related to similar behavior in the past . its for real , not playing \
> Bruno for Hezbollah and Mossad guys so do not disappoint me
> 2. from crypto guys : are there methods for md5 and sha1 to guarantee that a \
> certain hash will not produced out no matter what input? is having such requirement \
> , a part of definition and certifying a serious hash algo or the question is \
> totally irrelevant?
>
> "- going out ?
> - we all are . act accordingly"
>
>
> _______________________________________________
> Dailydave mailing list
> Dailydave@lists.immunityinc.com (mailto:Dailydave@lists.immunityinc.com)
> https://lists.immunityinc.com/mailman/listinfo/dailydave
>
>
[Attachment #5 (text/html)]
<div>
1. i know of a case of a very eastern country receiving threats \
after they broke a billion dollar metamphetamine ring hosted in a country in middle \
east . their emails had signs , through the sighs ME investigators found the group \
and sent back the judiciary report to the original country . in many ancient colonies \
, having a sign or contact produced sort of unity , direction , help , alerts , \
recruitment and announcements . later in more modern societies that had secret cults \
, signs were continuing to be elements of existence , secret message broadcast where \
secret channel is unavailable and alike . </div><div><br></div><div>nowadays , such \
behavior , to me understanding is just enjoying a bit of "catch me if you can" , \
although being a dark phsyc op shouldn't be ruled out immediately . in mentioned case \
, i believe the later is the case .</div><div><br></div><div>2. take a look at any \
crypto book under "Birthday Attack" \
.</div><div><br></div><div>Regards</div><div>M</div> <div></div>
<p style="color: #A0A0A8;">On Friday, July ۱۴, ۱۳۹۱ at ۳:۴۹, \
DarkPassenger wrote:</p>
<blockquote type="cite" \
style="border-left-style:solid;border-width:1px;margin-left:0px;padding-left:10px;"> \
<span><div><div><div> good to know a brother ( if you are a sister , drop me a \
private line IMMEDIATLY :D ) is already pushed the recently famous \
c5e2b30053762c2984d26b84748c59fc up for crack at Fri 31st Aug,2012 10:40 pm . as a \
civilian i assume like me he does not know much about terrorism so he is curious to \
find a way to contact and setup a meet with some nice talented guys for a drink and \
Hooka session , but i want to make one educated step before and know a thing or two \
before that . following are the questions :</div><div><br></div><div>1. from \
experienced cyber terrorists out there : do you think md5ing a contact is a good idea \
? of course i am not asking anybody lessons on number crunching . Q is aiming at the \
cyber terror side of the issue . all due respects , is mid5ing your contact is a \
common cyber Soprano practice ? if yes i would like to see a pastebin of any data \
related to similar behavior in the past . its for real , not playing Bruno for \
Hezbollah and Mossad guys so do not disappoint me </div><div><br></div><div>2. from \
crypto guys : are there methods for md5 and sha1 to guarantee that a certain hash \
will not produced out no matter what input? is having such requirement , a part of \
definition and certifying a serious hash algo or the question is totally \
irrelevant?</div><div><br></div><div><br></div><div>"- going out ?</div><div>- we all \
are . act accordingly"</div><div><br></div><div><br></div><div>_______________________________________________</div><div>Dailydave \
mailing list</div><div><a \
href="mailto:Dailydave@lists.immunityinc.com">Dailydave@lists.immunityinc.com</a></div><div><a \
href="https://lists.immunityinc.com/mailman/listinfo/dailydave">https://lists.immunityinc.com/mailman/listinfo/dailydave</a></div></div></div></span>
</blockquote>
<div>
<br>
</div>
_______________________________________________
Dailydave mailing list
Dailydave@lists.immunityinc.com
https://lists.immunityinc.com/mailman/listinfo/dailydave
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic