|
Full Disclosure
mailing list archives
Re: Evidence of fake security research from SecurStar GmbH
From: "Thor (Hammer of God)" <Thor () hammerofgod com>
Date: Sun, 31 Jan 2010 23:48:46 +0000
What journalists, bloggers, and security magazines? I've not seen anything about these people anywhere.
t
From: full-disclosure-bounces () lists grok org uk [mailto:full-disclosure-bounces () lists grok org uk] On Behalf Of
Fabio Pietrosanti
Sent: Sunday, January 31, 2010 3:41 PM
To: full-disclosure
Subject: [Full-disclosure] Evidence of fake security research from SecurStar GmbH
Ok, now we have the evidence: The research was a fake security research arranged for a marketing campaign.
They was able cheat most journalists, bloggers and security magazines.
I don't remember in all my life a so irresponsible and dirty marketing trick in the security world, abusing of hackers
reputations.
Read below, they leaked the IP of the anonymous author of http://infosecurityguard.com and it's confirmed that it come
from SecurStar GmbH office:
Evidence that infosecurityguard.com/notrax is SecurStar GmbH - A fake independent research on voice
crypto<http://infosecurity.ch/20100201/evidence-that-infosecurityguard-comnotrax-is-securstar-gmbh-a-fake-independent-research-on-voice-crypto/>
(by me)
Dishonest security: The SecurStart GmbH
case<http://infosecurity.ch/20100201/dishonest-security-the-securstart-gmbh-case/> (by me)
Debunking Infosecurityguard identity<http://www.lastknight.com/2010/01/31/debunking-infosecurityguard-com-identity/>
from Matteo Flora .
It's hilarious and unbelievable that a security company had done something like this.
Fabio Pietrosanti (naif)
On 30/gen/10, at 15:51, Fabio Pietrosanti (naif) wrote:
Hi all,
i don't know how many of you have read about the analysis done on http://infosecurityguard.com .
I have made a detailed analysis of their initiative and the result is that:
- it's most probably a camouflage marketing initiative and not a independent security research
- they consider a security context where local device has been compromised (no software can be secured in that case)
- they do not consider cryptographic security arguments
Below my analysis on this (read it carefully):
http://infosecurity.ch
Maybe it's interesting, maybe not, but for sure some facts are very relevant!
Fabio Pietrosanti (naif)
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
By Date
By Thread
Current thread:
|