http://arstechnica.com/security/2015/06/report-hack-of-government-employee-records-discovered-by-product-demo/ … OPM hack discovered in product demo; I see the NSA has sure been paying attention to playing defense there
@empiricalerror Actually think it's bc they tried to sneak it into corners of upstream which is supposed to target transit @puellavulnerata
-
-
@emptywheel Hmm, the docs seem to suggest one-end-foreign, no?@puellavulnerata -
@empiricalerror Suspect they have China's known DOD hackers. Not necessarily all tho@puellavulnerata -
@emptywheel Doubtful. Not how that system works. Selectors wouldn't be tied to specific persons, but rather represent...@puellavulnerata -
@empiricalerror that's what they wanted to move to. as i lay out i don't think they were able to https://www.emptywheel.net/2015/06/11/the-timing-of-the-contemplated-upstream-cyber-grab/ …@puellavulnerata -
@emptywheel But they were signature-targeting under other certfications already...@puellavulnerata -
@emptywheel No reason to believe that was stopped.@puellavulnerata -
@empiricalerror no, but those were sig targeting, not pattern analysis. that's done on 215, 12333, other metadata@puellavulnerata -
@emptywheel Their definition of signatures in the cyber context encompasses such patterns.@puellavulnerata
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.