@mattblaze I wonder who would use this argument. If given nearly any piece of software, can you tell how many times it's been run?
-
-
Replying to @mattblaze
@mattblaze I'm sure they would, but I think the launcher + shellcode discharge all potential arguments about the validity of the search.1 reply 0 retweets 0 likes -
Replying to @mattblaze
@mattblaze I'm having a lot of trouble coming up with a concrete scenario where the exploit soruce code blows a hole open.2 replies 0 retweets 0 likes -
Replying to @mattblaze
@mattblaze Right, and you can inspect the shellcode to verify the search was specific and there are network pcaps to prove it.1 reply 0 retweets 0 likes -
Replying to @mattblaze
@mattblaze I think it was smart for the FBI to frame the exploit as "key" then, implies single function, no other use beyond unlocking door1 reply 0 retweets 0 likes
@mattblaze Sorry for keeping you up late, this was an interesting conversation. Thanks for entertaining my persistent questioning.
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.