Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email email@example.com
From: Parity (pty.errgmail.com)
Date: Mon Jan 18 2010 - 22:01:24 CST
>From http://soup.rachner.us/post/42213514/Getting-Screwed, my
real-life alter-ego's prediction of roughly what Hillary Clinton is
going to say to China on Thursday:
All of this investment is supposed to give you guys some skin in the
game. If you prefer the previous arrangement, in which the
"developed" world lures your best and brightest away with its many
comfortable inducements, we can arrange that.
On Fri, Jan 15, 2010 at 1:25 PM, Moxie Marlinspike
> Agreed. The spin on this has been great. From what I can tell:
> 1) Google's China office has been thoroughly compromised by insiders,
> such that they really have no choice but to shut it down. Their PR
> department is absolutely and terrifyingly amazing, though. So instead
> of just closing it in defeat, they take "a stance for freedom," forcing
> the government to shut them down instead. Fucking brilliant!
> 2) Based on the rumors and quotes in the media/blog world, the attack
> vectors were what everyone has been talking about for years, and were
> somewhat sloppily orchestrated at that. Folks in the security industry
> realized that this is a chance to take their hype to all-new fertile
> grounds of hype-fare, though, and so suddenly "spearfishing" is "totally
> unprecedented" and "sophisticated to a level never before seen."
> The result is that:
> 1) Google is a hero. There is no pause to question the pernicious nature
> of the data they're collecting in the first place, and the revelation
> that they had automated "lawful" intercept systems in place (which were
> possibly compromised themselves) is glossed over.
> 2) The security industry can continue coming to the rescue with "new
> solutions." There is no pause to question whether the "secure systems"
> the industry offers are even possible, given the ease of this breach and
> the ever-growing value of what's at stake.
> I've been very impressed with how neatly this has come together so far.
> - moxie
> Charles Miller wrote:
>> I think the interesting thing about "sophisticated" attacks, is that
>> if they are actually sophisticated, the victims never know it
>> happened. And if the victim's DO figure out it happened, at least
>> they shouldn't be able to find your 0-day sitting in their inbox for
>> analysis. Total amateur hour (not that it probably wouldn't have
>> pwned me).
>> On Jan 15, 2010, at 12:39 PM, dave wrote:
>> I think we're seeing a sudden change in how large companies (or simply
>> companies with a high level of perceived threat) deal with software
>> security. Perhaps the era of IDS and AV and scanners has come to an
>> abrupt end? We can only hope.
>> Everyone says an attack is "sophisticated" whenever any 0day is
>> involved. But that should be the baseline. Or rather, it IS the
>> and everyone seems to just be finding out.
>> One of the things Immunity has been including in our services but is
>> offering seperately is a client-side 0day penetration test against a
>> single host using CANVAS technology. You get your penetration verified
>> during phone consultation. And you receive real-time analyst
>> interpretation of results, plus delivery of log data at the end. For
>> more information you can contact markimmunityinc.com.
>> Dave Aitel
>> Immunity, Inc.
> Dailydave mailing list
>> Dailydave mailing list
> Dailydave mailing list
Dailydave mailing list