Tech details on the FBI's Tor exploit seem essential for certain defenses. See, e.g., https://www.cs.columbia.edu/~smb/papers/rsearch.pdf …https://twitter.com/bradheath/status/717465105588482049 …
You can add location information to your Tweets, such as your city or precise location, from the web and via third-party applications. You always have the option to delete your Tweet location history. Learn more
@mattblaze If given the shellcode, I think you can make that argument? It does the search. I'm not sure what perspective the exploit adds.
@dguido The argument would be that the beacon was installed on more computers than authorized by the warrant.
@mattblaze How does a copy of the exploit source code indicate the # of times it was used (in potential violation of warrant terms)?
@dguido The point is not whether I think I did, but whether the defense is given a fair shot to make the case.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.