Hi list,
There now seems to be a wealth of documents and articles on the general
techniques spy agencies employ for both wide-net and targeted surveillance
around the world. Additionally, there are many documents and articles that
outline general techniques of exploiting end-user devices like routers,
servers, laptops, phones, etc.
The list of potentially exploited devices seems to be comprehensive-- anything
that is a general computing device connected to the internet is at risk.
So-- over a year after the initial Snowden-leak stories-- I'm curious if anyone
has references to articles or papers that have researched and reproduced any of
these exploits to show how they are used in practice to steal data, surveil,
etc.
I'm interested in case studies that either discuss how some the flow of data on
an end-user's exploited machine differs from a normal machine, or how certain
inputs trigger extremely suspicious behavior on that machine. Are there any
such case studies?
Thanks,
Jonathan
--
Liberationtech is public & archives are searchable on Google. Violations of
list guidelines will get you moderated:
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe,
change to digest, or change password by emailing moderator at
[email protected].