on list moderation of great justice [was: [oss-security] list policy (Re: Truly scary SSL 3.0 vuln to be revealed soon:) ]

coderman coderman@gmail.com
Mon Nov 3 20:02:36 PST 2014


> On Tue, Oct 14, 2014 at 10:48:00PM -0700, Walter Parker wrote:
>> What is this list's policy on Full Disclosure?
>...

as one who enjoys a significant moderation delay on Full-Disclosure,
 i feel qualified to pontificate on this subject. [0]

per the monthly statistics summarized at
http://seclists.org/fulldisclosure/ one can easily see how the careful
pruning of noise on this channel has resulted in double digit density
goodness, e.g. Aug 2014 at 89 posts; a new record of brevity and
decorum!

i for one gladly await the day a more properly, more aggressively
moderated full-disclosure reaches single digits and utmost
conciseness. you can do it, Fyodor!



On 10/15/14, Solar Designer <solar@openwall.com> wrote:
> Looks like I need to comment on the specific questions on list policy:
> ...
> Whatever is sent to the list, if on-topic and otherwise appropriate
> ... is posted with no artificial delay... the only difference from the
> Full-Disclosure mailing list (as far as I understand how it's run) is
> that oss-security is limited to / focused on Open Source.

i for one agree with Full-Disclosure's policy that active
monkey-in-the-middle attacks are of zero interest. spectrum hi jinx?
how cross site...
 [ "The Internet Threat Model" finds your privacy not cost effective. sorry! ]

given such undeniable logic, i must fully support the ongoing total
moderation with infinite delay of coderman@gmail.com on the
full-disclosure list.  never again from coderman is too soon!



finally,

regarding other aspects of full-disclosure, i must disclose that i
have nothing further to say on the conspiracy in the information
security industry to assist various intelligence agencies, including
Attrition.org collaboration with NSA TAO [1] and Fyodor's relationship
with GCHQ's HACIENDA scanner [2].

best regards,



0. see "RC4 is dangerous in ways not yet known - heads up on near
injection WPA2 downgrade to TKIP RC4" - moderated on F-D since Sept.
 , also "Preferred Roaming List Zero Intercept Attack [was: DEF CON
nostalgia [before that: going double cryptome at DEF CON 22]][still
confusing]" moderated days to Aug 4 post send on 1st.

1. "Tailored Access Operations ... Details on a program titled
QUANTUMSQUIRREL indicate NSA ability to masquerade as any routable
IPv4 or IPv6 host."
 - https://en.wikipedia.org/wiki/Tailored_Access_Operations#Virtual_locations

2. "GCHQ project HACIENDA [...] uses [nmap] port scanning to find
vulnerable systems for Five Eyes intelligence agencies."
 - https://en.wikipedia.org/wiki/TCP_Stealth



More information about the cypherpunks mailing list