Burning an exploit protects infrastructure for the six weeks it takes to develop another. Then what? Look farther.https://twitter.com/chort0/status/679799339015770113 …
-
-
Replying to @Snowden
@Snowden@durumcrustulum We’re not talking about exploits. We’re talking about cryptographic backdoors.4 replies 4 retweets 4 likes
@tqbf 3) No way to know if Juniper voluntarily shared their non-standard points with NSA (many do), but time-til- detection implies did not.
8:05 AM - 24 Dec 2015
0 replies
32 retweets
32 likes
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.