⚠️ Final stages: EDiting to re-open shortly ⚠️
Content restoration (Mostly done, few things missing that will be restored sporadically) Image restoration (Somehow still going? You can check statistics for more information)
Æ Imageboard (Delayed, work to be resumed at a later date)
Mediawiki upgrade and backend fixes
.onion domain for Tor-friendly editing and viewing
CSS overhaul (Fixing things like the videos on mobile, and overall a rehaul of the wiki's look to be more friendly to readers)
Paid bounty board for new articles (Won't be managed by me for legal reasons however I will ensure it runs smoothly)
Anonymous phone # service for those seeking ban evades from Twitter as well as a phone number not tied to their name (more details at launch)
If you have any questions you can join our public Telegram chat to DM me privately or @ me in chat.
You can also email me via [email protected]
Merch Status: Merch is in. Waiting for USPS envelopes to mail out.
July 27, 2005. Las Vegas. One lone graduate student took the podium at the Black Hat Conference just before Defcon 17, white hat on backwards and glassy look in his eyes. The hacker, Michael Lynn, proceeded to drop the drama bomb of all drama bombs: Cisco Systems had released a router OS with a potentially fatal security flaw in it.
How Bad Was This?
Cisco had ignored the problem for months and Lynn's speech came as a total surprise to the community at large. Cisco had attempted to subvert the announcement a month prior to the speech by releasing a fix and not telling anyone about the severity of the problem. However, this is Black Hat, where full disclosure is king.
—Michael Lynn, to Wired about the severity of the bug.
This flaw was especially problematic because:
- Cisco hadn't had the time to distribute/make it clear to people that their patch covered a critical security flaw, and
- Every expert that could deal with the problem was in Las Vegas, partying hard in the lead up to Defcon.
Mike had quit his job at Internet Security Systems (ISS) a mere hour before his speech. ISS had been pressured by Cisco and its own customers to fire Michael Lynn if he made the speech. Black Hat had done their best to discourage him as well. Cisco and ISS even banded together to produce an alternative speech that would expose a little less of Cisco's systems in the process.
Michael was reluctant at first to announce his findings, going into a schpiel about VOiP networks and getting booed by hackers who were now expecting the original speech with the announcement of Micheal's resignation from his company. With a little more prodding, he launched into his speech about the router exploit.
In short, Mike had gone PERP a mere week before the major hacker conference in the world. Frenzied security faggots were on their cell phones in seconds, trying to fix the problem before hackers on steroids could raid and pillage their networks. Cisco was embarrassed in a very public fashion and swore revenge.
Lynn could hardly anticipate the shitstorm about to be unleashed upon him. His lawyer arrived at the conference a short while after Michael gave the speech, and the first thing Michael told her is that he anticipated a lawsuit.
Cisco bawwed at the top of its lungs after the speech. First, they appealed to the security people, asking them to understand their point of view. They then ran to the FBI, saying that Lynn's speech had constituted a criminal breach of security and was going to cost Cisco millions in the long run.
Cisco and ISS settled with Lynn on the terms that he destroy all his research and never discuss the materials in depth again. However, the FBI pressed their investigation onward, claiming he violated trade secrets held by ISS.
Michael Lynn was forbidden from speaking at future Black Hats and Defcons, a ban later rescinded as Cisco attempted to make nice during the backlash created after people began rushing to Lynn's side. Cisco would later invite him to their pre-Black Hat 2006 party.
Ciscogate is part of a series on Security Faggots
2cash • AnonOps • Brian Salcedo • Fearnor • Fry Guy • Gadi Evron • g00ns • Hack This Site • Hacking Team • hann • Joanna Rutkowska • John Field • Joseph Camp • Lizard Squad • LulzSec • Mark Zuckerberg • MarshviperX • Masters of Deception • Michael Lynn • Krashed • Raven • r000t • Ryan • Steve Gibson • th3j35t3r • The Regime • Sabu • Zeekill
Avira • Ciscogate • Cloudflare • Conficker • CyberDefender • Defcon • The Gibson • The Great Em/b/assy Security Leak of 2007 • Heartbleed • I GOT NORTON! • Is Your Son a Computer Hacker? • Operation Sundevil • PIFTS.exe • Social engineering • Stylometry • SubSeven • Zone-H