@mattblaze As far as I can tell, FBI is willing to share all post-exploit code that retrieves that info too. https://www.scribd.com/doc/306272980/Special-Agent-Daniel-Alfin-s-Declaration-in-Playpen-Case …
@mattblaze I'm having a lot of trouble coming up with a concrete scenario where the exploit soruce code blows a hole open.
-
-
@dguido Prosecutor says "this code is just an exploit". Defense says "we think it may have also unlawfully exfiltrated data". -
@mattblaze Right, and you can inspect the shellcode to verify the search was specific and there are network pcaps to prove it. - 5 more replies
New conversation -
-
-
@mattblaze At the end of the day, we're talking about an easily verifiable network flow from the target to a server.Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.