Search Mailing List Archives


Limit search to: Subject & Body Subject Author
Sort by: Reverse Sort
Limit to: All This Week Last Week This Month Last Month
Select Date Range     through    

[liberationtech] proof of tampering

Jonathan Wilkes jancsika at yahoo.com
Tue Sep 16 09:15:39 PDT 2014


Hi list,
     There now seems to be a wealth of documents and articles on the general techniques spy agencies employ for both wide-net and targeted surveillance around the world.  Additionally, there are many documents and articles that outline general techniques of exploiting end-user devices like routers, servers, laptops, phones, etc.

The list of potentially exploited devices seems to be comprehensive-- anything that is a general computing device connected to the internet is at risk.

So-- over a year after the initial Snowden-leak stories-- I'm curious if anyone has references to articles or papers that have researched and reproduced any of these exploits to show how they are used in practice to steal data, surveil, etc.

I'm interested in case studies that either discuss how some the flow of data on an end-user's exploited machine differs from a normal machine, or how certain inputs trigger extremely suspicious behavior on that machine.  Are there any such case studies?


Thanks,
Jonathan
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.stanford.edu/pipermail/liberationtech/attachments/20140916/1d38d30a/attachment.html>


More information about the liberationtech mailing list