Search Mailing List Archives


Limit search to: Subject & Body Subject Author
Sort by: Reverse Sort
Limit to: All This Week Last Week This Month Last Month
Select Date Range     through    

[liberationtech] DecryptoCat

Maxim Kammerer mk at dee.su
Thu Jul 11 08:59:20 PDT 2013


On Tue, Jul 9, 2013 at 4:45 PM, Jacob Appelbaum <jacob at appelbaum.net> wrote:
> I think he very clearly stated it:
>
> Interviewer: What happens after the NSA targets a user?
>
> Snowden: They're just owned. An analyst will get a daily (or scheduled
> based on exfiltration summary) report on what changed on the system,
> PCAPS 9 of leftover data that wasn't understood by the automated
> dissectors, and so forth. It's up to the analyst to do whatever they
> want at that point -- the target's machine doesn't belong to them
> anymore, it belongs to the US government.

Indeed, after rereading this excerpt I see that he meant exploitation.
Perhaps I was too influenced by the first automatic translation from
German.

Are there any known examples of such NSA-grade exploits being used to
own targets? I.e., besides one-of-a-kind events like Stuxnet/Flame.
E.g., Chinese attacks are being mentioned all the time, but even those
seem to rely on spearfishing attacks.

--
Maxim Kammerer
Liberté Linux: http://dee.su/liberte



More information about the liberationtech mailing list