As I mentioned yesterday, they'll likely claim a dump to subscribers, but that will be unverifiable. 3/n
-
-
Replying to @MalwareJake
Emailing dumps to specific addresses instead of fire and forget posts is a new escalation of risk for them. Moar metadata. 4/npic.twitter.com/Y8trJmejAQ
1 reply 0 retweets 8 likes -
Replying to @MalwareJake
If you subscribed, you broke the law, and US or not, you'll likely become an immediate target of the US Intel community 5/n
4 replies 1 retweet 20 likes -
-
-
Replying to @laurilove @ducatirocks0369
Different between analyzing a public dump and buying a private one.
1 reply 0 retweets 0 likes -
The first batch of files were treated as stolen. https://www.emptywheel.net/2016/08/24/takedowns-of-shadow-brokers-files-affirm-files-as-stolen/ …
1 reply 0 retweets 0 likes -
Replying to @emptywheel @laurilove and
And the possession of SB's files would be treated as a proliferation risk and therefore mark someone for SIGINT targeting if overseas.
1 reply 0 retweets 1 like
(Unless it was just more lists of TAO hackers and their SWIFT targets in which case it'd be a force protection justification.)
-
-
Not sure. The USG (as you well know) is unpredictable and vindictive.
2 replies 0 retweets 0 likes -
USG can be vindictive and unpredictable without the help of any courts!!
2 replies 0 retweets 0 likes
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.