Hi list,
     There now seems to be a wealth of documents and articles on the general 
techniques spy agencies employ for both wide-net and targeted surveillance 
around the world.  Additionally, there are many documents and articles that 
outline general techniques of exploiting end-user devices like routers, 
servers, laptops, phones, etc.

The list of potentially exploited devices seems to be comprehensive-- anything 
that is a general computing device connected to the internet is at risk.

So-- over a year after the initial Snowden-leak stories-- I'm curious if anyone 
has references to articles or papers that have researched and reproduced any of 
these exploits to show how they are used in practice to steal data, surveil, 
etc.

I'm interested in case studies that either discuss how some the flow of data on 
an end-user's exploited machine differs from a normal machine, or how certain 
inputs trigger extremely suspicious behavior on that machine.  Are there any 
such case studies?


Thanks,
Jonathan
-- 
Liberationtech is public & archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
[email protected].

Reply via email to