Burning an exploit protects infrastructure for the six weeks it takes to develop another. Then what? Look farther.https://twitter.com/chort0/status/679799339015770113 …
-
-
@tqbf It works like this: 1) NSA encourages credulous partners to adopt Dual-EC via NCSC (https://www.nsa.gov/business/programs/ncsc.shtml …). Some do. Some weak.Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
@tqbf Vendors aren't explicitly asked to "backdoor" products. Too risky. Even NCSC unlikely to know when NSA recs poisoned. No need to know.Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
@tqbf 2) When unwitting backdoor efforts fail (example, nonstandard point adoption), NSA simply moves on. Likely what happened with Juniper.Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
@tqbf 3) No way to know if Juniper voluntarily shared their non-standard points with NSA (many do), but time-til- detection implies did not.Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
@tqbf 4) Top-tier adversary subverts the backdoored standard (then-unusable) in ScreenOS codebase. NSA doesn't notice, bc not using. -
-
@matthew_d_green@tqbf Fair point, but I'm trying to illustrate general principles of how the backdoor-insertion process works. -
@matthew_d_green@tqbf Priority point: NSA does work w witting tech partners to insert a backdoor, but that's EXCEPTIONAL, not standard. - 1 more reply
New conversation -
-
-
@tqbf 5) CI effort or NTOC catches adversary in act of Juniper exploitation or using Dual-EC for exfil. Investigate. Discovery.Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
@tqbf 6) NSA, realizing their bad standard has been subverted by the adversary, takes action to close. Notifies Juniper (likely via cutout).Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
@Snowden The document doesn’t even have to be related to the 2012 backdoor for that to be true.Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
@Snowden Nuance in discussions of exploits! Why, that's heresy! Next we'll have to admit most adversaries aren't well-funded intel orgs! - 1 more reply
New conversation -
-
-
@Snowden The contention is that they’d have learned about it earlier if the JNPR documents had been provided earlier. - 1 more reply
New conversation -
-
-
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
@Snowden@matthew_d_green@tqbf Scary that the federal government uses Juniper, if this is not NSA I would be worried about whats out thereThanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.