@mattblaze It sounds like the FBI Tor exploits are a lot more narrow than the situation contemplated in your paper.
@mattblaze I'm sure they would, but I think the launcher + shellcode discharge all potential arguments about the validity of the search.
-
-
@dguido From the defense's perspective, they have no way to know whether the prosecution's description of the components is accurate. -
@mattblaze I'm having a lot of trouble coming up with a concrete scenario where the exploit soruce code blows a hole open. -
@dguido Prosecutor says "this code is just an exploit". Defense says "we think it may have also unlawfully exfiltrated data". -
@mattblaze Right, and you can inspect the shellcode to verify the search was specific and there are network pcaps to prove it. -
@dguido The claim here would be that the withheld exploit code itself did some of the searching. I don't see how to refute that w/o code. -
@dguido Defense is generally entitled to wide latitude to raise such things.
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.