On Tue, Jul 9, 2013 at 4:45 PM, Jacob Appelbaum <[email protected]> wrote: > I think he very clearly stated it: > > Interviewer: What happens after the NSA targets a user? > > Snowden: They're just owned. An analyst will get a daily (or scheduled > based on exfiltration summary) report on what changed on the system, > PCAPS 9 of leftover data that wasn't understood by the automated > dissectors, and so forth. It's up to the analyst to do whatever they > want at that point -- the target's machine doesn't belong to them > anymore, it belongs to the US government.
Indeed, after rereading this excerpt I see that he meant exploitation. Perhaps I was too influenced by the first automatic translation from German. Are there any known examples of such NSA-grade exploits being used to own targets? I.e., besides one-of-a-kind events like Stuxnet/Flame. E.g., Chinese attacks are being mentioned all the time, but even those seem to rely on spearfishing attacks. -- Maxim Kammerer Liberté Linux: http://dee.su/liberte -- Too many emails? Unsubscribe, change to digest, or change password by emailing moderator at [email protected] or changing your settings at https://mailman.stanford.edu/mailman/listinfo/liberationtech
