Tech details on the FBI's Tor exploit seem essential for certain defenses. See, e.g., https://www.cs.columbia.edu/~smb/papers/rsearch.pdf …https://twitter.com/bradheath/status/717465105588482049 …
You can add location information to your Tweets, such as your city or precise location, from the web and via third-party applications. You always have the option to delete your Tweet location history. Learn more
@mattblaze How does a copy of the exploit source code indicate the # of times it was used (in potential violation of warrant terms)?
@dguido I don't know - since I've not seen the code, we have no idea what it does.
@mattblaze I wonder who would use this argument. If given nearly any piece of software, can you tell how many times it's been run?
@dguido If I were the defense, I'd demand to see the entire chain of code from selecting the target computer onward.
@mattblaze I'm sure they would, but I think the launcher + shellcode discharge all potential arguments about the validity of the search.
@dguido From the defense's perspective, they have no way to know whether the prosecution's description of the components is accurate.
@mattblaze I'm having a lot of trouble coming up with a concrete scenario where the exploit soruce code blows a hole open.
@dguido Prosecutor says "this code is just an exploit". Defense says "we think it may have also unlawfully exfiltrated data".
@mattblaze Right, and you can inspect the shellcode to verify the search was specific and there are network pcaps to prove it.
@mattblaze I guess I can *kind of* seem the rational for inspection of parts of the server infrastructure, or at least logs from it.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.