The debian-private mailing list leak, part 1. Volunteers have complained about Blackmail. Lynchings. Character assassination. Defamation. Cyberbullying. Volunteers who gave many years of their lives are picked out at random for cruel social experiments. The former DPL's girlfriend Molly de Blanc is given volunteers to experiment on for her crazy talks. These volunteers never consented to be used like lab rats. We don't either. debian-private can no longer be a safe space for the cabal. Let these monsters have nowhere to hide. Volunteers are not disposable. We stand with the victims.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Security of `dupload' and `pwgen'?



 Q1: Does `dupload' send the password across the Internet in the clear?
     Should I be using `ssh' instead, for that reason?[1]


 Q2: If I generate a password with `pwgen', couldn't someone run it in a 
     loop for a while, and collect the passwords it makes to use in
     guessing the maintainer's passwords?

  A2: I suppose that such an `attack' would be really obvious, provided
      the logs are monitored for that type of thing.  Is there a log
      processor that flags that sort of attempt?  May I have a copy of
      it to learn from?  Is this being practiced? (do I need to know?)

Footnotes: 
[1]  If I use `scp', how do I make the announcement to devel-changes?


-- 
mailto:karlheg@inetarena.com (Karl M. Hegbloom)
http://www.inetarena.com/~karlheg
Portland, OR  USA
Debian GNU 1.3.1+hamm  Linux pre-2.0.31-9+select+QNX  AMD K5 PR-133


--
TO UNSUBSCRIBE FROM THIS MAILING LIST: e-mail the word "unsubscribe" to
debian-private-request@lists.debian.org . 
Trouble?  e-mail to templin@bucknell.edu .