On Thu, 2013-06-20 at 03:32 -0400, Sean Alexandre wrote: > There was an interesting post on this the other day on the liberationtech > mailing list > by Mike Perry from the Tor Project: > > Deterministic builds and software trust > https://mailman.stanford.edu/pipermail/liberationtech/2013-June/009257.html > > To quote: > > > For the past several years, we've been seeing a steady increase in the > > weaponization, stockpiling, and the use of exploits by multiple > > governments, and by multiple *areas* of multiple governments. This > > includes weaponized exploits specifically designed to "bridge the air > > gap", by attacking software/hardware USB stacks, disconnected Bluetooth > > interfaces, disconnected Wifi interfaces, etc. Even if these exploits > > themselves don't leak (ha!), the fact that they are known to exist means > > that other parties can begin looking for them.
> > Also related, Bruce Scheier just wrote an interesting piece on weaponized > exploits, on > how the NSA is planting logic bombs and backdoors in machines and routers > around the > world: > > Has U.S. started an Internet war? > www.cnn.com/2013/06/18/opinion/schneier-cyberwar-policy > > Interesting links, thanks. -- To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/1371741712.11007.16.ca...@fast.cercy.net