Burning an exploit protects infrastructure for the six weeks it takes to develop another. Then what? Look farther.https://twitter.com/chort0/status/679799339015770113 …
-
-
Replying to @Snowden
@Snowden@durumcrustulum We’re not talking about exploits. We’re talking about cryptographic backdoors.4 replies 4 retweets 4 likes
@tqbf 2) When unwitting backdoor efforts fail (example, nonstandard point adoption), NSA simply moves on. Likely what happened with Juniper.
8:01 AM - 24 Dec 2015
0 replies
28 retweets
32 likes
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.