[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Is Sandy really censoring criticisms of Stronghold, his product?



Okay, I went through my old mail, and I'm fairly sure this is the
message.  I'm convinced it never went to the flames list, and now that
I've found out I'm on the -unedited list after all, I think it
probably didn't go to the regular cypherpunks list either.  Can people
on the various lists confirm this for me?

Given the total lack of technical content, the flamey nature of the
article, and the fact that it is verifiably false (stronghold source
code is available), I can see people arguing it should have gone to
-flames (though I would probably disagree).  However, I don't want to
debate that.  What I object to more strongly and think is wrong is the
fact that it went to *neither* list.

A lot of people out there are subscribing to the cypherpunks-flames
and cypherpunks lists thinking that they will see everything that gets
rejected (albeit with a substantial delay).  If this is not the case,
it should be made clear.  Otherwise, it's not moderation, but
dishonesty.

--

>From [email protected]  Thu Jan 30 17:26:50 1997
From: [email protected] (Dr.Dimitri Vulis KOTM)
Subject: Security alert!!!
To: [email protected]
Date: Thu, 30 Jan 97 16:15:21 EST
Organization: Brighton Beach Boardwalk BBS, Forest Hills, N.Y.
Received: (from majordom@localhost) by toad.com (8.7.5/8.7.3) id OAA18833; Thu, 30 Jan 1997 14:17:05 -0800 (PST)
Received: from uu.psi.com (uu.psi.com [38.9.86.2]) by toad.com (8.7.5/8.7.3) with SMTP id OAA18824; Thu, 30 Jan 1997 14:16:39 -0800 (PST)
Received: by uu.psi.com (5.65b/4.0.061193-PSI/PSINet) via UUCP;
        id AA02017 for ; Thu, 30 Jan 97 16:57:10 -0500
Received: by bwalk.dm.com (1.65/waf)
	via UUCP; Thu, 30 Jan 97 16:19:19 EST
	for [email protected]
Comments: All power to the ZOG!
Message-Id: <[email protected]>
Sender: [email protected]
Precedence: bulk
Lines: 19

WARNING: There's a rogue trojan horse out there on the internet known as the
"stronghold web server".  It's actually a hacked-up version of Apache with a
backdoor, which allows hackers (or whoever knows the backdoor) to steal credit
card numbers and other confidentil information on the Internet.

Be careful! Always use encryption. Do not send confidential information 9such
as passwords and credit card numbers) to any site running the trojan horse
"stronghold". 

In general, beware of "snake oil" security products and hacked-up versions of
free software.

Please repost this warning to all relevant computer security forums.

---

<a href="mailto:[email protected]">Dr.Dimitri Vulis KOTM</a>
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps