http://arstechnica.com/security/2015/06/report-hack-of-government-employee-records-discovered-by-product-demo/ … OPM hack discovered in product demo; I see the NSA has sure been paying attention to playing defense there
@empiricalerror @puellavulnerata Why? They're scanning known sigs, and my still have to tie it to a known foreign govt.
-
-
@emptywheel "It was China!" -> Tie to known foreign govt. Chinese intrusion sigs being well known to NSA is a safe guess.@puellavulnerata -
@empiricalerror It was China, they say months after discovering hack. That doesn't mean they had sig.@puellavulnerata -
@emptywheel Then their system is complete shit.@puellavulnerata -
@empiricalerror Actually think it's bc they tried to sneak it into corners of upstream which is supposed to target transit@puellavulnerata -
@emptywheel Hmm, the docs seem to suggest one-end-foreign, no?@puellavulnerata -
@empiricalerror Suspect they have China's known DOD hackers. Not necessarily all tho@puellavulnerata -
@emptywheel Doubtful. Not how that system works. Selectors wouldn't be tied to specific persons, but rather represent...@puellavulnerata -
@empiricalerror that's what they wanted to move to. as i lay out i don't think they were able to https://www.emptywheel.net/2015/06/11/the-timing-of-the-contemplated-upstream-cyber-grab/ …@puellavulnerata - 4 more replies
New conversation -
-
-
@emptywheel does that mean there is a separate process there?@empiricalerror@puellavulnerataThanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.