The First Look article is light on details so I don't know how one gets
from "infect[ing] large-scale network routers" to "perform[ing]
"exploitation attacks" against data that is sent through a Virtual Private
Network."  I'd like to better understand that.


On Thu, Mar 13, 2014 at 7:22 AM, Jeffrey Walton <noloa...@gmail.com> wrote:

> On Thu, Mar 13, 2014 at 9:17 AM, Jason Iannone <jason.iann...@gmail.com>
> wrote:
> > Are there details regarding Hammerstein?  Are they actually breaking
> > routers?
> Cisco makes regular appearances on Bugtraq an Full Disclosure. Pound
> for pound, there's probably more exploits for Cisco gear than Linux
> and Windows combined.
>
> Jeff
>
> > On Thu, Mar 13, 2014 at 2:40 AM, Jeffrey Walton <noloa...@gmail.com>
> wrote:
> >>
> >> On Thu, Mar 13, 2014 at 1:57 AM, coderman <coder...@gmail.com> wrote:
> >> >
> >> >
> https://s3.amazonaws.com/s3.documentcloud.org/documents/1076891/there-is-more-than-one-way-to-quantum.pdf
> >> >
> >> > "TAO implants were deployed via QUANTUMINSERT to targets that were
> >> > un-exploitable by _any_ other means."
> >> >
> >> And Schneier's Guardian article on the Quantum and FoxAcid systems:
> >>
> >>
> http://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymity
> .
>



-- 
PGP Public Key: 2048R/AC65B29D
_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to