
Full Disclosure mailing list archives
RIM Blackberry buffer overflow, DoS, data loss
From: Feher Tamas <etomcat () freemail hu>
Date: Wed, 13 Oct 2004 12:41:19 +0200 (CEST)
Hello, Would someone please enlighten Mr. Hexview and tell him that his words "HexView does not notify vendors unless there is a prior agreement to do so" sound very much like an extortion attempt (racketeering?) He(x) should be aware of how easy it is to find yourself in a brig at Gitmo held in secrecy these days. Phone networks and services carried over phone technology have always been considered critical infrastructure, unlike the Internet and thus you could be classified as organized crime or even a terrorist (for threatening to target critical infrastucture as part of a conspiracy to commit extortion). Thus RIM-Berry as a target is NOT a wise idea. Apart from law enforcement, one would think HexView has enough common sense not to cross swords with the world's largest companies, who all support and are financially interested in the success of the famed RIMBerry. Hexview can only be the loser in the end. Hey HexView hear the message: be a nice guy and tell the vendors when you find some bug! They will fix it and put your real name in the security advisory. You'll be famous and find some good job. Having problems with not having girls is no good reason for black hat hacking. After all, prosituates are NOT available for rent in most prisons, so your sex troubles will not be solved in the cooler. If you get a good job and buy a fancy car, it will be much easier to pick up chicks. Regards: Tamas Feher. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Current thread:
- RIM Blackberry buffer overflow, DoS, data loss Feher Tamas (Oct 13)