@mattblaze As far as I can tell, FBI is willing to share all post-exploit code that retrieves that info too.https://www.scribd.com/doc/306272980/Special-Agent-Daniel-Alfin-s-Declaration-in-Playpen-Case …
@mattblaze I'm having a lot of trouble coming up with a concrete scenario where the exploit soruce code blows a hole open.
-
-
@dguido Prosecutor says "this code is just an exploit". Defense says "we think it may have also unlawfully exfiltrated data". -
@mattblaze Right, and you can inspect the shellcode to verify the search was specific and there are network pcaps to prove it. -
@dguido The claim here would be that the withheld exploit code itself did some of the searching. I don't see how to refute that w/o code. -
@dguido Defense is generally entitled to wide latitude to raise such things.
End of conversation
New conversation -
-
-
@mattblaze At the end of the day, we're talking about an easily verifiable network flow from the target to a server.Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.