Is Sandy really censoring criticisms of Stronghold, his product?

Against Moderation antimod at nym.alias.net
Fri Feb 7 14:07:33 PST 1997


Okay, I went through my old mail, and I'm fairly sure this is the
message.  I'm convinced it never went to the flames list, and now that
I've found out I'm on the -unedited list after all, I think it
probably didn't go to the regular cypherpunks list either.  Can people
on the various lists confirm this for me?

Given the total lack of technical content, the flamey nature of the
article, and the fact that it is verifiably false (stronghold source
code is available), I can see people arguing it should have gone to
-flames (though I would probably disagree).  However, I don't want to
debate that.  What I object to more strongly and think is wrong is the
fact that it went to *neither* list.

A lot of people out there are subscribing to the cypherpunks-flames
and cypherpunks lists thinking that they will see everything that gets
rejected (albeit with a substantial delay).  If this is not the case,
it should be made clear.  Otherwise, it's not moderation, but
dishonesty.

--

>From cypherpunks-errors at toad.com  Thu Jan 30 17:26:50 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Subject: Security alert!!!
To: cypherpunks at toad.com
Date: Thu, 30 Jan 97 16:15:21 EST
Organization: Brighton Beach Boardwalk BBS, Forest Hills, N.Y.
Received: (from majordom at localhost) by toad.com (8.7.5/8.7.3) id OAA18833; Thu, 30 Jan 1997 14:17:05 -0800 (PST)
Received: from uu.psi.com (uu.psi.com [38.9.86.2]) by toad.com (8.7.5/8.7.3) with SMTP id OAA18824; Thu, 30 Jan 1997 14:16:39 -0800 (PST)
Received: by uu.psi.com (5.65b/4.0.061193-PSI/PSINet) via UUCP;
        id AA02017 for ; Thu, 30 Jan 97 16:57:10 -0500
Received: by bwalk.dm.com (1.65/waf)
	via UUCP; Thu, 30 Jan 97 16:19:19 EST
	for cypherpunks at toad.com
Comments: All power to the ZOG!
Message-Id: <aw5c2D4w165w at bwalk.dm.com>
Sender: owner-cypherpunks at toad.com
Precedence: bulk
Lines: 19

WARNING: There's a rogue trojan horse out there on the internet known as the
"stronghold web server".  It's actually a hacked-up version of Apache with a
backdoor, which allows hackers (or whoever knows the backdoor) to steal credit
card numbers and other confidentil information on the Internet.

Be careful! Always use encryption. Do not send confidential information 9such
as passwords and credit card numbers) to any site running the trojan horse
"stronghold". 

In general, beware of "snake oil" security products and hacked-up versions of
free software.

Please repost this warning to all relevant computer security forums.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps







More information about the cypherpunks-legacy mailing list