@dguido A defense could be that the beacon was installed more widely than permitted by the warrant, and thus invalidated the search.
-
-
Replying to @mattblaze
@mattblaze If given the shellcode, I think you can make that argument? It does the search. I'm not sure what perspective the exploit adds.2 replies 0 retweets 0 likes -
Replying to @mattblaze
@mattblaze How does a copy of the exploit source code indicate the # of times it was used (in potential violation of warrant terms)?2 replies 0 retweets 0 likes -
Replying to @mattblaze
@mattblaze I wonder who would use this argument. If given nearly any piece of software, can you tell how many times it's been run?2 replies 0 retweets 0 likes -
Replying to @mattblaze
@mattblaze I'm sure they would, but I think the launcher + shellcode discharge all potential arguments about the validity of the search.1 reply 0 retweets 0 likes -
Replying to @mattblaze
@mattblaze I'm having a lot of trouble coming up with a concrete scenario where the exploit soruce code blows a hole open.2 replies 0 retweets 0 likes
@mattblaze At the end of the day, we're talking about an easily verifiable network flow from the target to a server.
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.