Tech details on the FBI's Tor exploit seem essential for certain defenses. See, e.g., https://www.cs.columbia.edu/~smb/papers/rsearch.pdf …https://twitter.com/bradheath/status/717465105588482049 …
You can add location information to your Tweets, such as your city or precise location, from the web and via third-party applications. You always have the option to delete your Tweet location history. Learn more
@mattblaze It sounds like the FBI Tor exploits are a lot more narrow than the situation contemplated in your paper.
@dguido How does the defense know that?
@mattblaze From reading their statements, it looks like the FBI will provide everything from shellcode onward that ran on the target.
@dguido As a matter of law, all the defense is entitled to examine anything that could be relevant to such challenges.
@mattblaze Rather than perform a "search" they beacon a few bits of info and quit. IMHO little of your argument about specificity applies.
@mattblaze As far as I can tell, FBI is willing to share all post-exploit code that retrieves that info too.https://www.scribd.com/doc/306272980/Special-Agent-Daniel-Alfin-s-Declaration-in-Playpen-Case …
@dguido A defense could be that the beacon was installed more widely than permitted by the warrant, and thus invalidated the search.
@dguido No way for the defense to raise that challenge without technical detail on that.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.