Search Mailing List Archives
mk at dee.su
Thu Jul 11 08:59:20 PDT 2013
On Tue, Jul 9, 2013 at 4:45 PM, Jacob Appelbaum <jacob at appelbaum.net> wrote:
> I think he very clearly stated it:
> Interviewer: What happens after the NSA targets a user?
> Snowden: They're just owned. An analyst will get a daily (or scheduled
> based on exfiltration summary) report on what changed on the system,
> PCAPS 9 of leftover data that wasn't understood by the automated
> dissectors, and so forth. It's up to the analyst to do whatever they
> want at that point -- the target's machine doesn't belong to them
> anymore, it belongs to the US government.
Indeed, after rereading this excerpt I see that he meant exploitation.
Perhaps I was too influenced by the first automatic translation from
Are there any known examples of such NSA-grade exploits being used to
own targets? I.e., besides one-of-a-kind events like Stuxnet/Flame.
E.g., Chinese attacks are being mentioned all the time, but even those
seem to rely on spearfishing attacks.
Liberté Linux: http://dee.su/liberte
More information about the liberationtech