Home page logo

fulldisclosure logo Full Disclosure mailing list archives

RIM Blackberry buffer overflow, DoS, data loss
From: Feher Tamas <etomcat () freemail hu>
Date: Wed, 13 Oct 2004 12:41:19 +0200 (CEST)


Would someone please enlighten Mr. Hexview and tell him that
his words "HexView does not notify vendors unless there is a
prior agreement to do so" sound very much like an extortion
attempt (racketeering?)

He(x) should be aware of how easy it is to find yourself in
a brig at Gitmo held in secrecy these days.

Phone networks and services carried over phone technology
have always been considered critical infrastructure, unlike
the Internet and thus you could be classified as organized
crime or even a terrorist (for threatening to target
critical infrastucture as part of a conspiracy to commit
extortion). Thus RIM-Berry as a target is NOT a wise idea.

Apart from law enforcement, one would think HexView has
enough common sense not to cross swords with the world's
largest companies, who all support and are financially
interested in the success of the famed RIMBerry. Hexview can
only be the loser in the end.

Hey HexView hear the message: be a nice guy and tell the
vendors when you find some bug!

They will fix it and put your real name in the security
advisory. You'll be famous and find some good job. Having
problems with not having girls is no good reason for black
hat hacking. After all, prosituates are NOT available for
rent in
most prisons, so your sex troubles will not be solved in the
cooler. If you get a good job and buy a fancy car, it will
be much easier to pick up chicks.

Regards: Tamas Feher.

Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

  By Date           By Thread  

Current thread:
  • RIM Blackberry buffer overflow, DoS, data loss Feher Tamas (Oct 13)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]