@mattblaze If given the shellcode, I think you can make that argument? It does the search. I'm not sure what perspective the exploit adds.
@mattblaze Right, and you can inspect the shellcode to verify the search was specific and there are network pcaps to prove it.
-
-
@dguido The claim here would be that the withheld exploit code itself did some of the searching. I don't see how to refute that w/o code. -
@mattblaze I think it was smart for the FBI to frame the exploit as "key" then, implies single function, no other use beyond unlocking door - 3 more replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.