Burning an exploit protects infrastructure for the six weeks it takes to develop another. Then what? Look farther.https://twitter.com/chort0/status/679799339015770113 …
-
-
-
@matthew_d_green@tqbf Fair point, but I'm trying to illustrate general principles of how the backdoor-insertion process works. -
@matthew_d_green@tqbf Priority point: NSA does work w witting tech partners to insert a backdoor, but that's EXCEPTIONAL, not standard. - 1 more reply
New conversation -
-
-
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
@Snowden@matthew_d_green@tqbf So in this explanation the adversary - and not the NSA - exploited the vuln bc the NSA was more ethical? -
@Snowden@matthew_d_green@tqbf i.e., the adversary was willing to tamper with the source code and NSA was not? I assume they're both able.
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.