Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email email@example.com
From: Elazar Broad (elazarhushmail.com)
Date: Tue Dec 30 2008 - 15:13:07 CST
-----BEGIN PGP SIGNED MESSAGE-----
And they should have listened then, it was only a matter of time
before someone fleshed out a practical attack, and that time is
now. Then again, I am sure there some ATM's out there still using
DES. How many time's do we need to prove Moore's law...
On Tue, 30 Dec 2008 15:26:46 -0500 Nelson Murilo
>Implementation could be new, but this vulnerabillity is knew since
>the year that md5 was broken.
>On Tue, Dec 30, 2008 at 08:10:16PM +0000, n3td3v wrote:
>> Aiding script kids to get credit card numbers out of folks e-
>> purchases. I'm sure the U.S secret service have a special
>> this vulnerability, as so much of their time nowadays is taken
>> following up on internet carders and shutting them down.
>> On Tue, Dec 30, 2008 at 5:03 PM, Elazar Broad
>> > -----BEGIN PGP SIGNED MESSAGE-----
>> > Hash: SHA1
>> > SSL/PKI is only as strong as the weakest CA...
>> > For those of you who haven't been following this, here you go:
>> > http://www.win.tue.nl/hashclash/rogue-ca/
>> > http://www.phreedom.org/research/rogue-ca/md5-collisions-
>Full-Disclosure - We believe in it.
>Hosted and sponsored by Secunia - http://secunia.com/
-----BEGIN PGP SIGNATURE-----
Note: This signature can be verified at https://www.hushtools.com/verify
Version: Hush 3.0
-----END PGP SIGNATURE-----
Click to become a master chef, own a restaurant and make millions.
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/