<JYA> Hash this motherfucker, said math to germ.
coderman
coderman at gmail.com
Tue Dec 30 13:31:30 PST 2014
On 12/29/14, John Young <jya at pipeline.com> wrote:
> From discussion on these lists and elsewhere tampering with
> data can, does, occur at every software and hardware hand-off,
> with each self-serving iteration having hidden and vulnerable hardware
> and software undisclosed malignity, no matter the security ostentatiously
> applied
said another way:
there are risks known, and known unknown, and unknown unknown,
in such a calculated cache - digital and present harm alike and unto the
soul-deep sickness a dragon Smaug, imbued as dark greed,
unto sea of coin and wealth unseen in any other age...
the risk visible, or not. fathomable, or not. but risk all the same.
---
"This is a trap, witting and unwitting.
Do not use it or use at own risk.
Source and this host is out to pwon and phuck you in complicity
with global Internet authorities.
Signed Batshit Cryptome and Host,
9 July 2014, 12:16ET."
- https://cpunks.org//pipermail/cypherpunks/2014-July/005020.html
still true, as always!
... as practical matter, content in such an archive is more
actionable in a criminal or civil sense, in some locales, simply by
nature of the contention around the content. or loaded with malware.
or honeytoken to the void, or ruse of attention sink, or misleading
intentionally compartment of confusion, or generator markov awry, or
...
---
FY2014 corpora is coming, like cryptome-jul2014
reply to receive early distribution.
- cryptome, web, other selected volumes
- sha256 short sums, selected signatures
- annotated search-able formats, where available
- coder's annotations and subsets [to explain later]
- Xapian stores by domain for custom aggregation or scope
More information about the Testlist
mailing list