On Tue, Jul 9, 2013 at 4:45 PM, Jacob Appelbaum <ja...@appelbaum.net> wrote:
> I think he very clearly stated it:
>
> Interviewer: What happens after the NSA targets a user?
>
> Snowden: They're just owned. An analyst will get a daily (or scheduled
> based on exfiltration summary) report on what changed on the system,
> PCAPS 9 of leftover data that wasn't understood by the automated
> dissectors, and so forth. It's up to the analyst to do whatever they
> want at that point -- the target's machine doesn't belong to them
> anymore, it belongs to the US government.

Indeed, after rereading this excerpt I see that he meant exploitation.
Perhaps I was too influenced by the first automatic translation from
German.

Are there any known examples of such NSA-grade exploits being used to
own targets? I.e., besides one-of-a-kind events like Stuxnet/Flame.
E.g., Chinese attacks are being mentioned all the time, but even those
seem to rely on spearfishing attacks.

--
Maxim Kammerer
Liberté Linux: http://dee.su/liberte
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Reply via email to