Speaking of Beto O'Rourke, who used to be with the hacker group, can anyone provide some quality info/links about Cult of the Dead Cow? Yes, I can do news.google.com searches too; and I know of, but haven't read, the Joseph Mann book. Wondering if anyone here can suggest some really good resources, videos, links, whatever.
‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐ On Monday, September 27, 2021 5:19 PM, Douglas Lucas dal@riseup.net wrote:
Speaking of Beto O'Rourke, who used to be with the hacker group, can anyone provide some quality info/links about Cult of the Dead Cow?
Emma Best wrote the best summary: https://theoutline.com/post/7529/cult-of-the-dead-cow-beto-orourke-hacktivis... The Cult of the Dead Cow (cDc), a hacker group founded in Lubbock, Texas in 1984, paved the way for a generation of hacktivists, making members into celebrities within the hacking community. In 1999, the group took the stage at the seventh annual DEFCON hacker convention in Las Vegas to announce the release of BackOrifice 2000 (BO2K), which could be used — for good or ill — to gain control over powerful computers running Windows operating systems. Yesterday, the group released[behind the scenes](https://www.youtube.com/watch?v=oHxNEvklKqE)footage showing not just the legendary presentation itself, but the lead-up to an event that would have a permanent effect on the infosec community, as well as FBI[documents](https://archive.org/details/CultOfTheDeadCow)obtained by Freedom of Information Act request which show that the cDc’s previous software releases had earned them the attention of the FBI. The group aimed to force Microsoft, at the time the most powerful computer company in the industry, to improve its network security, and wanted to provide the world with a powerful, legitimate, and free to use remote administration tool. The Bureau, however, saw BO2K — which, if used by IT professionals needing to access their network’s computers their own device, essentially served the same purpose as products that Microsoft itself sold — as a “virus” that could be used to attack military and corporate computers. To the FBI and Microsoft, the problem wasn’t that the insecurities in Windows existed – it was that they could no longer ignore them. “Our position is that Windows is a fundamentally broken product,” he told reporter Julian Borger in an[interview](https://www.theguardian.com/technology/1999/jul/13/microsoft.business)withTh... Guardian. To an older generation of hackers, BO2K and its legendary release are a seminal moment in hacker history, one which the public can now experience through the eyes of cDc. At the previous year’s DEFCON, cDc had released the[original Back Orifice](https://hackstory.net/BackOrifice), which took its name from[Microsoft’s BackOffice server](https://en.wikipedia.org/wiki/Microsoft_BackOffice_Server)and allowed users to remotely access personal computers running Windows 95 or 98. At the time, the information security industry was bound by a sense of inertia, with companies such as McAfee focused less on creating software that addressed newly discovered issues with Windows and instead on marketing campaigns that depicted computer viruses as abstractions that could only be solved through[literal](https://www.youtube.com/watch?v=MDyk-B3q5bk) [magic](https://www.youtube.com/watch?v=Y__vaelX3yY). Meanwhile, Microsoft’s proprietary remote administration software, SMS, was expensive, rigid, and functionally no different from many hacking tools. “One of the reasons Back Orifice is so nasty is that Microsoft doesn't design its operating systems to be secure. It never has,” security expert Bruce Schneier[toldCNN](http://www.cnn.com/TECH/computing/9909/29/back.orifice.idg/index.html)in 1999. “Don't worry, ‘cause everything's gonna BO2K,” cDc’s[Deth Veggie](https://twitter.com/DethVeggie/)told the crowd as the presentation shifted to the hacker known as DilDog, one of the primary developers of BO2K, to explain the highly anticipated new software. While the uninitiated might have expected a typical DEFCON talk or presentation, cDc was there to create spectacle. The group planned a show with music and strobe lights, during which a member named Mudge shredded on an electric guitar. They were going to[“show some control,”](https://www.youtube.com/watch?v=oHxNEvklKqE&t=2698)not just introducing the world to BO2K, but irrefutably demonstrating the weakness of Microsoft Windows. cDc knew that their best chance of conveying their message was the DEFCON presentation itself. The newly released behind the scenes footage shows them preparing an impressive selection of lights and music for show. They would throw out glowing buttons as they walked to the stage. As the group put it, people were going to “have to sit through a sermon” to get to the show. It was not an opportunity they intended to waste. [cDc live at DEFCON 7] cDc live at DEFCON 7Reid Fleming (cDc) The group saw a hypocrisy in the way Back Orifice had been represented by both media and Microsoft itself, as well as how they anticipated that BO2K would be represented, which the group was keen to highlight in their DEFCON presentation. “A lot of those other tools out there, [such as Microsoft’s SMS], have modes that can be installed surreptitiously and run without the user noticing,” DilDog said during the talk. “It sounds kind of fishy, doesn't it?” Simply put, the group's view was that the only difference between their remote administration tool and Microsoft's was that Microsoft was Microsoft and they were, well, the Cult of the Dead Cow. The group also had a message for the burgeoning hacktivists in the audience. “A lot of you kids out there, you go out there and you're like: 'Yeah man, I'm gonna hack the website for some bumfuck ISP and save Tibet,’” cDc’s Tweety Fish told the crowd. “I’m not gonna tell you that web page hacks for a political point are wong, but pick the cause before you pick the site you're gonna hack. Make it a little relevant! If you can think of a way to use your hacking skills to make a difference, that's the fucking future. That is going to change the world.” Flame wars and pointless defacements, the group warned, would not. The newly released footage highlights that the earnestness that cDc showed in the press wasn’t simply an exercise in PR. “What [Microsoft is] saying about [Windows security]” Deth Veggie claimed, was “akin to Ford in the 1970s telling Pinto owners, 'You'll be fine as long as you make sure nobody rear-ends you. Ever.'” cDc’s mission, he said, was to break the company’s “mentality of insecurity.” [Deth Veggie makes the Pinto comparison in the foreground while NIGHTSTALKER listens in the background.] Deth Veggie makes the Pinto comparison in the foreground while NIGHTSTALKER listens in the background.Reid Fleming (cDc) Today, Deth Veggie recognizes that cDc’s hope that the existence of BO2K would make a point to Microsoft may have been naive. He told The Outline via text message that “in hindsight it was probably idealistic of us to think that we could have made a multi-gazillion dollar juggernaut fix their shit as opposed to just trying to PR spin their way out of the problem.” But the risk went well beyond a simple PR nightmare for cDc members. According to a statement released by the group alongside the footage, since “BO2K's architecture allowed for encryption plugins (for example, it shipped with a 3DES plugin), cDc members ran the very real risk of being charged with violating federal export regulations. In fact, cDc's legal counsel specifically warned that the government had an unpredictable history of such prosecutions.” Even the legal danger the group placed itself in arguably helped point out governmental hypocrisy: By the late ’90s, strong encryption had become more and more necessary to prevent internet users from hacking attacks, but such anti-export statutes, which were meant to prohibit the release of encryption technology to hostile governments, actually kept such tools out of the hands of individuals who were vulnerable to cyberattacks. --------------------------------------------------------------- The documents members of cDc obtained via FOIA request in 2014 from the FBI show that the group was under active investigation at the time of the release, specifically for their connection to the software. Following the release of the original Back Orifice, the FBI spoke to representatives of the Internet service provider Mindspring, who reported that some clients’ computers had been infected by people taking advantage of the access provided by the Back Orifice software. FBI / FOIA The FBI acknowledged that cDc characterized Back Orifice as a remote administration tool, but nevertheless went on to write that “the information released with BO clearly indicates that BO is a hacker tool.” The documents imply that they believed cDc was behind attacks such as the ones against Mindspring subscribers, as opposed to the 300,000-plus people who had deliberately downloaded the software. (The[original release notes](https://web.archive.org/web/19981205143320/cultdeadcow.com/tools/bo.html)for Back Orifice list legitimate uses for the software such as encrypted file transfer, system monitoring and in-depth system administration, and the group denied involvement with the Mindspring breaches beyond their release of BO.) FBI / FOIA Despite cDc’s intentions, the FBI assumed the worst. The FBI’s inquiry into the group pointed to the software’s open source nature and easy customization through plug-ins as a potential information security threat, fearing that malicious actors would use this to weaponize the software. The FBI Director sent pages of memos to all of the FBI’s field offices on the potential threat posed by BO2K, large portions of which are redacted in the released documents. Attached to one of the memos is an unredacted nationwide warning to all field offices and “appropriate [Department of Defense] facilities." FBI / FOIA The FBI noted BO2K allowed remote control of servers in addition to home computers, making major corporations, the government, and the military all vulnerable to attack, recommending that such “commonly targeted groups” take steps to “aggressively review and monitor comprehensive security measures to protect against the kind of exploits caused or supported by Back Orifice 2000.” Which, in a sense, was what the cDc was trying to get everyone to do all along. Ultimately unable to find evidence of a crime in their jurisdiction, the Bureau’s Atlanta division simply noted the software existed and closed the investigation. While the Bureau was unable to bring charges against cDc, Microsoft was ready to attack cDc and BO2K,[claiming](https://news.microsoft.com/1999/07/08/microsoft-alerts-customers-to-potentia... the software “is designed to be stealthy and evade detection by the user.” However, the cat was out of the bag. In the two decades after the release of BackOrifice 2000, Windows[continued to have serious security issues](https://www.schneier.com/crypto-gram/archives/2005/0615.html), exploitable by hackers, criminals, and[even the NSA](https://www.washingtonpost.com/business/technology/nsa-officials-worried-abo...), who developed a set of hacking tools that were leaked to the public in 2017. What has mitigated these security concerns hasn’t been Microsoft’s actions, but instead a transition away from hyperextensible operating systems such as Windows and towards closed sandboxes such as Apple’s OSX. While cDc may have lost the battle by failing to cause immediate change, they were on the right side of history, and their point has been proven for them by years of fallout. The Cult of the Dead Cow also recently made headlines when it was revealed that Presidential candidate Beto O’Rourke[had been a member](https://www.reuters.com/investigates/special-report/usa-politics-beto-orourk... the hacktivist group, writing blog posts on the cDc site under the name Psychedelic Warlord (some of[his old cDc posts](http://textfiles.com/groups/CDC/cDc-0031.txt)can still be read online). In the years since cDc’s heyday, members like Peiter Zatko (then known as Mudge) have gone on to high-profile positions with Google and[DARPA](https://en.wikipedia.org/wiki/Peiter_Zatko#DARPA), and the group’s exploits were recently chronicled in Joseph Menn’s bookCult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World. For cDc's members, the footage is a trip down memory lane. “I would have preferred more cockfighting,” joked the group's Krass Katt in a press release, “but the old footage is still pretty cool.” He continued, “Everyone seems so young and lifelike. It was also fun seeing our old pals (who have since passed away) THE NIGHTSTALKER, a former CIA contractor, and [frequent cDc poster] Tequila Willy, who ran for president a few times before that Beto guy.” BO2K highlighted the security vulnerabilities that Microsoft had let fester in different versions of its Windows operating systems. These vulnerabilities could be used to allow people to use computers without being tethered to the physical device, or to allow people to abuse the computers by seizing control of them remotely. BO2K also challenged Microsoft’s hegemony over the tools that exploited these vulnerabilities by giving users a free alternative, in the process demonstrating that creating an environment of good computer security was worth risking jail.
see also: https://www.eff.org/deeplinks/2019/07/s-original-cult-dead-cow-supergroup-me... Original Cult of the Dead Cow Members Keep it "Wacky, Weird, and Wild" to Celebrate Joseph Menn's Newest Book BY[HANNAH DIAZ](https://www.eff.org/about/staff/hannah-diaz) JULY 25, 2019 [Window Snyder speaking as other panelists listen.] On June 18, the[Internet Archive](https://archive.org/)hosted a reading and panel discussion in celebration of Joseph Menn's[new book](https://www.amazon.com/Cult-Dead-Cow-Original-Supergroup/dp/154176238X)Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World. As the evening's event began, an[archived video](https://archive.org/details/nc101_hackers)of Cult of the Dead Cow (cDc) interviews from 1996 played silently on a wall-mounted TV, featuring some of the very same original members who would be a part of that evening's panel. In addition to the strong turnout at the Internet Archive itself, those unable to attend in person were able to[watch the event livestreamed](https://www.youtube.com/watch?v=5Lm3Mdi7sYQ)on the Internet Archive's Youtube channel. Guests enjoyed light refreshments and mingled before moving into the main auditorium to be welcomed by Internet Archive founder Brewster Kahle. After sharing a brief history of the Internet Archive's mission, Executive Director of the[Electronic Frontier Foundation](https://www.eff.org/)Cindy Cohn took the stage as MC for the evening. Cohn expressed the importance of remembering the "wacky, weird, and wild" history of Internet security, and acknowledged the cDc's contributions to improving the community before introducing Joseph Menn to the stage. Menn recounted the beginning of cDc and cybersecurity by highlighting notable hackers and their contributions throughout the years, including crediting the cDc with coining the term "hacktivism" by "using it at every interview they could at DEFCON to get it into the English language." Looking forward, he went on to express how "the rank-and-file in Silicon Valley now are the most important heirs of the cDc's tradition of critical moral thinking." Following Menn, Cohn retook the stage and introduced the panel speakers: Chris Rioux AKA DilDog, Back Orifice 2000 author and Veracode founder; Window Snyder, cDc fellow traveler and former core security staffer at Microsoft, Apple, and now Square; and Michael "Misha" Kubecka AKA Omega, cDc's editor, media list curator and archivist. Each took turns sharing what had originally drawn them to the cDc and their individual reasons for staying. Left to Right: Josh Buchbinder (cDc), Cindy Cohn, Adam O'Donnell (cDc), Window Snyder, Mike Seery (cDc), Chris Rioux (cDc), Katie Moussouris, Misha Kubecka (cDc), Joseph Menn. After sharing, Cohn began to read questions from the audience, starting with a question for Window Snyder: Question: If you could go back in time and change one thing to make the Internet more secure, where and when would you go, and what would you do?
Window Snyder: If we had taken what we knew back then and applied it to all the different systems that we were building at the time and also made iteasy. Easy for the developers to take an existing API, an existing library, and use it to encrypt the security of those systems. Easy for the consumer to not have to go through a thousand steps to get full-volume encryption on their Windows device. If everyone is following the same steps, that's something we could automate. We didn't do that end of that work, and I don't think there was a lot of value given to that aspect of security, which is the part that makes it accessible to others—the democratization of security—until we had significant security problems already, had an ecosystem of malware built upon taking advantage of consumer information on these devices. There was an opportunity there and we missed it.
The panel continued to answer questions from the audience, and as the evening concluded, several excellent questions still remained. Rather than let these questions go unanswered, the speakers were able to follow up via email with some further insight: Question: How do we, as individuals, cope with the commercialization of our digital identities? Practically, psychologically, spiritually?
Chris Rioux: Demand a constitutional right to privacy. You don't cope, you fight it. Demand laws that allow you to withdraw your identity from databases. Assert a legal right to manage your data and that withdrawing access to your data from corporations is your right. This includes derivative works, including your connected social graph. Corporations won't hand you these rights without you punching them in the face with the law.
Question: With the rapid growth of fake photos and video technology, do you think it is possible to still protect authenticity and anonymity in the media?
Chris Rioux: Yes. Digital signing of video can make fakes harder for the average person. The chips that are recording the video in your mobile devices and cameras can be using cryptography to digitally sign the media as unaltered. While this would prevent some forms of modification of the video, a technical solution that allowed a small amount of compositing and resizing/cropping while maintaining the digital signature is possible. Media outlets should insist on using only signed media where it can be proved where the origin of the video came from.
Question: Tell us about the name Cult of the Dead Cow?
Joseph Menn: Like many things in cDc, it was a bit of an inside joke—a reference to an abandoned slaughterhouse in Lubbock, Texas, which was where the founders lived. It was a creepy hangout for them. As teenagers on the early Internet, it seemed important to be a bit sinister. Otherwise, what would be the attraction?
Question: Do you see any contemporary groups/cons/etc. carrying on the cDc spirit?
Michael Kubecka: Germany's Chaos Computer Club (CCC) has long been a socially-conscious organization using its tech skills and wry sense of humor to highlight issues of surveillance and privacy. Telecomix's technical support of ordinary Egyptians during the Arab Spring to help them evade government censorship was laudatory. SecureDrop, developed by Aaron Swartz & Kevin Poulsen to facilitate secure communication between whistleblowers and journalists, will help bring sunshine to dark places.The good news is that hacktivism is no longer the exclusive domain of hackers and hacking groups. To name just two examples: Joshua Browder wrote a chatbot to automate the process of contesting parking tickets, saving ordinary people millions of dollars. Now that marijuana is legal in California, Los Angeles county and Code for America are using an algorithm to clear more than 50,000 pot convictions, restoring dignity and employability countless people.
The event ended with a final question from the audience: "What ways do you recommend I spread the word and get people to think about ethics?" In keeping with the cDc's history and focus on community, the speakers stressed building interpersonal relationships, practicing empathy, and focusing on public service. As Cohn brought the event to a close, she encouraged everyone to meet with others who care about ethics, the future, and having fun with technology, starting with the people already in the room. For those able to attend in person or watch via the livestream, the event was an insightful look back into the not-so-distant past of cybersecurity. Much of the discussion demonstrated how the hacking community began as exclusive and inaccessible, growing to eventually encompass, and ultimately prioritize, today's average user. While the need for those willing to take on the increasing challenges surrounding technology is greater than ever before, the cDc's notoriously unconventional legacy continues to inspire us to rise up to face them, tongue firmly in cheek.
see also, GOBBLES tribute... ah, them were the dayz... ;P~ https://attrition.org/security/advisory/gobbles/GOBBLES-05.txt ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++++++++GOBBLES+SECURITY+RESEARCH+TEAM+INCORPORATED+++++++++++++++++ ALERT! ALERT! LAME INFORMATION LEAKAGE BUG IN NETSCAPE MAIL! ALERT! ALERT! ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ #include "/tmp/.warez/0day/banter.h" OK GOBBLES promise to keep this advisory short because this bug is not complex like many others and is not a necessary precaution in this current advisory. Something GOBBLES have always wondered about is the different webbrowsers and why no programmers are able to program a good webbrowser that does not consume all system resources at all times. And GOBBLES also does not know why it is that no webbrowser programming teams are able to make their webbrowser products table. It is so annoying when GOBBLES is looking at he favorite websites and iexplore.exe die and all GOBBLES application close down with it! And the Mozilla (appropriately named for being such a big bloated ugly green beast) is only better because it do not kill the desktop shell when it die, but it die more frequently which is many more annoying too. And the Opera is very nice except it do not implement all the nice web features properly and can be annoying when looking at certain pay adult sites that GOBBLES are fond of! PRODUCT ******* Netscape Mail (aka nsmail) website: www.netscape.com BACKGROUND ********** GOBBLES were browsing through packetstormsecurity.org and found an interesting paper which are called "Passive System Fingerprinting using Network Client Applications" written by Jose Nazario which can be found on on GOBBLES favorite security site which is packetstormsecurity.org at http://packetstormsecurity.org/papers/protocols/passive.pdf . The idea of this paper is that information can be found when monitoring network traffic to determine information on a certain host on a network without actually making any new traffic to a host which could trigger the IDS systems. SECURITY HISTORY **************** hehehe too many to list! Go www.securityfocus.com and search for Netscape and you will see that they have a worse security history than the WUFTPD daemon! GOBBLES think you get the idea, hehehehe. Why people use software programs with such significant security history is beyond GOBBLES comprehension! If a program is knowed for having many bugs why can you trust its security when the teams do not seem to be improving on they programming abilities? VERSIONS AFFECTED ***************** All versions of Netscape Mail that the GOBBLES researchers tested seemed to be vulnerable to this attack. NOT TESTED ********** Internet Explorer, Pegasus Mail, and Eudora Mail. THE PROBLEM *********** OK here is what happen. If someone are running Netscape Mail as their mail client and they are emailed a hyperlink (GOBBLES suggest the study of RFC2817 if you do not understand these) and they click on it from inside nsmail, then the webbrowser Netscape is run. When doing the HTTP protocol negotiation with the HTTP server it will send information in the Referer (hehehe really in English the word is referrer but the hackers who wrote HTTP made mistake and made it Referer! so quit making fun of GOBBLES English when you know you do not have the brave enough to mock the authors of HTTP!) field which contains the full pathnames to the users account on the system. So on a *nix system it will show /home/username/.netscape/nsmail (or /usr/home/username/.netscape/nsmail depending on your flavor HEHEHE or the many other pathnames that it might be) and on a Windows system it will show C:\Program Files\Netscape\Users\username\mail. Now you ask GOBBLES, "GOBBLES how is this a vulnerability?" Very simple young grasshooper! Because we also get the IP of the person who is viewing the html document! Then you can know at least one username on their system and then we have an expanded window of attack on the system since now we may begin attempting to bruteforce their passwords on the system! Letting outside world know the names of your users on the system like that is never a good thing because it allows the bruteforce password hacking exploits to be used on your systems! EXPLOIT DETAILS *************** GOBBLES have provided a full working POC (proof of concept) exploit for this problem so that you can better understand it yourself. It requires that you edit the sourcecode to make it work though hehehe so it prevents some people from maliciously abusing it! Here are the exploit! ----------------------------cut here------------------------------------- #!/bin/sh # PROOF OF CONCEPT EXPLOIT FOR THE INFORMATION LEAK VULNERABILITY # IN NETSCAPE MAIL (NSMAIL) DISCOVERED BY GOBBLES OF THE GOBBLES # SECURITY RESEARCH TEAM. THIS EXPLOIT HAS BEEN FULLY DISCLOSED # BUT SHOULD NOT BE USED FOR ANY MALICIOUS PURPOSES. IT WILL NOT # WORK WITH OUT SOME MODIFICATIONS SO IT IS REQUIRED THAT THE # PERSON USING IT HAS SOME KNOWLEDGE OF SHELL SCRIPTING. THIS WILL # MAKE IT ONLY WORK FOR THE PENTESTERS WHO CAN APPRECIATE THE # GOODNESS OF THIS EXPLOIT AND SHOULD HOPEFULLY PREVENT IT FROM # BEING USED BY PEOPLE WITH MALICIOUS INTENTIONS! ENJOY! # LOVE, # GOBBLES # ok, phase one, creating our payload! /usr/bin/clear echo '[*] EXPLOIT FOR NETSCAPE MAIL [*]' echo '[*] written by GOBBLES [*]' echo '[*] ABUSE IT AND YOU LOSE IT! [*]' echo '[*] step one: create letter!! [*]' umask 077 cat << _GOBBLES_ >/tmp/evil-letter Hi Friend, please visit my new website at http://www.somesitethatismonitored.com/monitoredhtml.html and let me know what you think! Thank you friend! Love, GOBBLES http://www.bugtraq.org GOBBLES@hushmail.com _GOBBLES_ echo '[*] ok now phase one complete! [*]' echo '[*] ok now on to phase two! [*]' echo '[*] step two: sending email ;) [*]' cat /tmp/evil-letter | /bin/mail victim@suspectedNSMAILuser.com echo '[*] ok, step two now all done! [*]' echo '[*] now cleaning up our mess!! [*]' rm -rf /tmp/evil-letter echo '[*] Cleanup all complete now!! [*]' echo '[*] To complete process wait [*]' echo '[*] for the victim to click on [*]' echo '[*] the link then check your [*]' echo '[*] http logs for the username [*]' echo '[*] and IP then use your nmap [*]' echo '[*] to find what the computer [*]' echo '[*] is running then try to [*]' echo '[*] bruteforce your way in!!!! [*]' echo '[*] heheheh HAVE A LOT OF FUN! [*]' echo '[*] LOVE, [*]' echo '[*] GOBBLES [*]' echo '[*] http://www.bugtraq.org [*]' echo '[*] GOBBLES@hushmail.com [*]' ----------------------------now cut here--------------------------------- VENDOR NOTIFICATION STATUS ************************** GOBBLES Team did decide not to bother letting the Netscape programmers know about this problem before our full disclosure of the bug. Before you use this as a reason to start writing nasty email to GOBBLES about this action you need to consider the why we did it which is because we believe that the Netscape programmers are not too considerate about the security of their software anyways since there are always so many bugs in them being disclosed. They do sloppy work and sloppy work should not receive any special attention other than scorn which is what you should be feeling to them right now. SUGGESTED WORKAROUNDS ********************* Until the Netscape people can make a fix for this GOBBLES and friends have a few suggestions as to how you might work around this bug. [1] Use a better mail client like Pine or Elm or mutt or mailx. [2] Use web-based services to retrieve and view your email. Microsoft's Hotmail works good for this http://www.hotmail.com . [3] Do not use your Netscape Mail anymore until the problem is fixed. GREETS ****** dianora, tsk, snow, carolyn meinel, john vranesevich, steve gibson, kimble, knightmare, emmanuel goldstein, box.sk, @stake, securityfocus, sans.org, blackhat.com, defcon.org, 2600.com, #phrack@efnet, #hackphreak@undernet, bugtraq (thanks aleph1 and david ahmad for devoting your time to a great list), ntbugtraq (russel the love muscle ;D), cert.org, paul vixie, vesselin bontchev, reese witherspoon, kirsten dunst, katie holmes, aleister crowley, manly p hall, franz bardon, dennis ritchie, nietzsche, w. richard stevens, radiohead, george michael, larry wall, beethoven, francis bacon (the one and only true william shakespeare), bruce willis, bruce schneier, alan turing, john von neumann, donald knuth, michael abrash, robert sedgewick, richard simmons, goverment boy, ralph lauren (clothing designer to the true hackers), and all our friends and family. oh yeah and a P.S. from GOBBLES! ps: is Lady Caroline from the Cult of the Dead Cows the same person as Caroline Meinel from happyhacker.org? GOBBLES is only curious and if you can confirm our suspicions please email us ASP!
https://youtu.be/tr4PEQ-g7r8 From Defcon Sent from ProtonMail for iOS Açık Pzt, Eyl 27, 2021 20:19, Douglas Lucas <dal@riseup.net> yazdı:
Speaking of Beto O'Rourke, who used to be with the hacker group, can anyone provide some quality info/links about Cult of the Dead Cow? Yes, I can do news.google.com searches too; and I know of, but haven't read, the Joseph Mann book. Wondering if anyone here can suggest some really good resources, videos, links, whatever.
participants (4)
-
coderman
-
Douglas Lucas
-
Punk-BatSoup-Stasi 2.0
-
zeynepaydogan