Skip to main content

The Return of the Shadow Legacy

posted onMarch 14, 2001
by hitbsecnews

After 10 plus years of being underground the Shadow Legacy has step out
of the Shadows. Hidden in our secret and secure private Chat Servers and
messages servers. Where we work to help each other solve complex software
and hardware engineering problems. Filtering our work and advancements in
Network security, Apache, FreeBSD and countless other projects through
non discript Nics and aliases. Remaining in the darkness, free from the
chatter of the wantabes, Posers, and Feds. When our darker splinter and
off shoots such as MoD got busted by the Feds we quietly slipped into the
darkness.

The Shadow Legacy started in the shadows of the Mainframes before
Windows, before dial-up access, before the BBS Net connectivity. During
that time we never predicted nor did we foresee the explosion that was
waiting in the wings. We were Students, Young Professors, Young Military
Engineers, Young Government Engineers, and Young Corporate Employees in
the newly formed Information Technology Departments. We worked
independently at first then started to work together in small groups,
then in ever increasingly larger groups. We were all young and willing to
try anything to see if we could make it work.

In the old days to get
access, you needed to be connected to a University Mainframe, Military
Mainframe, Government Mainframe or a large Corporate Mainframe using a
LAN or Timeshare connected TTY. Personal Computers were still a dream.
I remember the days that War@HP would ask questions on solving
engineering problems with his computer kits. I¹d build a simulation on
the Navy¹s VAX in Seattle and send it to our CRAY Arlington, VA to run.
After 3 to 6 hours of processing at 99% usage (My Personal Computers now
could do the simulations in less a tenth of that time and for a 1000th
the cost) I¹d get the results and send them to Vic@IBM who would validate
the results and run the Comparative Analysis Profiles. Then Vic@IBM would
send the package to Milis@MIT and to Jan@USyd for a Electrical/Electronic
Part Equivalency Comparisons or Design Search at the University Research
Centers. Then they would send the final reports back to War@HP. The whole
time that this process is going on we would all be chatting with messages
sent from our TTY¹s. We¹d be chatting about the project and perhaps even
3 to 4 other projects that other people were doing. Like the problem that
Liv@Zox was have on a new chip for a lower voltage, faster, and cheaper
Network System project. She was having voltage and resistance problems.
War@HP had her send him her math and spec.s. War@HP found that she had
made a Math error. He corrected her math and helped her to resolve her
Voltage and Resistance problems.

(While I have changed the nics to maintain our privacy. The spirit
remains the same.)

From the old days to today we¹ve moved from the main frames and TTY¹s to
Personal Computers and broadband connectivity that are more powerful then
the mainframes and frame circuits we started out working on.
While must of us have started our own computer related companies we have
maintained our community and friendships over these many years.
As a community we have all ways been part of the Open Source of our
roots. A community can stay cloaked in secret places only so long. While
our Group will for the most part remain cloaked in our encrypted world of
secret meetings and private research. We are committed to cleaning the
Net of all the script kiddies and dangerous predators. While the Shadows
have been silent for far too long.

The Shadows will be be spending the next year or so working to enhance
internet security through a variety of projects. We¹re working to develop
new more secure methods of network security, new more secure protocols,
new encryption methods and better filtering methods.
With the vast numbers of insecure systems running highly vulnerable
exploitable operating systems and the inherently exploitable CISC based
processors. While the open source community has done a good job at
minimizing the risk that these processors have built into them. They can
do nothing for the Commercial Operating Systems that use these
processors. Until the commercial Operating Systems stop relying on the
CISC Processors Instruction Subsets that allow the exploits they will
never be secure. Only when the Computer Manufactures stop seller the
outdated slow CISC processor based systems will network security start
improving.

The Shadow Legacy is moving to improve security of these CISC processors
based systems. We have developed a method of placing Network Per and post
Processors between the network stream and the System. This effectively
isolates the system from the network stream.

Processor Exploits the Hardware Weak Link. Next time from the Shadow
Legacy Report.

1.) The Return of the Shadow Legacy - druid
2.) Rampant Piracy on the Sea of Information - xearthed
3.) Napster, MPAA, AOL, and how stupid people in power will kill the first amendment - unfrgvnme
4.) Copyright Law - Aleanor
5.) Hacking vs Sysadmining - madirish
6.) State of the Hack Awards #4 - madsaxon
7.) Somethings Never Change - UberGeek
8.) It's Not about Change - darlene
9.) Programming your PSX (part 1) - OZONE

Source

Tags

Intel

You May Also Like

Recent News

Friday, November 29th

Tuesday, November 19th

Friday, November 8th

Friday, November 1st

Tuesday, July 9th

Wednesday, July 3rd

Friday, June 28th

Thursday, June 27th

Thursday, June 13th

Wednesday, June 12th

Tuesday, June 11th