The First Look article is light on details so I don't know how one gets from "infect[ing] large-scale network routers" to "perform[ing] "exploitation attacks" against data that is sent through a Virtual Private Network." I'd like to better understand that.
On Thu, Mar 13, 2014 at 7:22 AM, Jeffrey Walton <noloa...@gmail.com> wrote: > On Thu, Mar 13, 2014 at 9:17 AM, Jason Iannone <jason.iann...@gmail.com> > wrote: > > Are there details regarding Hammerstein? Are they actually breaking > > routers? > Cisco makes regular appearances on Bugtraq an Full Disclosure. Pound > for pound, there's probably more exploits for Cisco gear than Linux > and Windows combined. > > Jeff > > > On Thu, Mar 13, 2014 at 2:40 AM, Jeffrey Walton <noloa...@gmail.com> > wrote: > >> > >> On Thu, Mar 13, 2014 at 1:57 AM, coderman <coder...@gmail.com> wrote: > >> > > >> > > https://s3.amazonaws.com/s3.documentcloud.org/documents/1076891/there-is-more-than-one-way-to-quantum.pdf > >> > > >> > "TAO implants were deployed via QUANTUMINSERT to targets that were > >> > un-exploitable by _any_ other means." > >> > > >> And Schneier's Guardian article on the Quantum and FoxAcid systems: > >> > >> > http://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymity > . > -- PGP Public Key: 2048R/AC65B29D
_______________________________________________ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography