Burning an exploit protects infrastructure for the six weeks it takes to develop another. Then what? Look farther.https://twitter.com/chort0/status/679799339015770113 …
-
-
Replying to @Snowden
@Snowden@durumcrustulum We’re not talking about exploits. We’re talking about cryptographic backdoors.4 replies 4 retweets 4 likes
@tqbf 5) CI effort or NTOC catches adversary in act of Juniper exploitation or using Dual-EC for exfil. Investigate. Discovery.
8:11 AM - 24 Dec 2015
0 replies
25 retweets
33 likes
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.