On Thu, 2013-06-20 at 03:32 -0400, Sean Alexandre wrote:

> There was an interesting post on this the other day on the liberationtech 
> mailing list
> by Mike Perry from the Tor Project:
> 
> Deterministic builds and software trust
> https://mailman.stanford.edu/pipermail/liberationtech/2013-June/009257.html
> 
> To quote:
> 
> > For the past several years, we've been seeing a steady increase in the
> > weaponization, stockpiling, and the use of exploits by multiple
> > governments, and by multiple *areas* of multiple governments. This
> > includes weaponized exploits specifically designed to "bridge the air
> > gap", by attacking software/hardware USB stacks, disconnected Bluetooth
> > interfaces, disconnected Wifi interfaces, etc. Even if these exploits
> > themselves don't leak (ha!), the fact that they are known to exist means
> > that other parties can begin looking for them.

> 
> Also related, Bruce Scheier just wrote an interesting piece on weaponized 
> exploits, on 
> how the NSA is planting logic bombs and backdoors in machines and routers 
> around the 
> world:
> 
> Has U.S. started an Internet war?
> www.cnn.com/2013/06/18/opinion/schneier-cyberwar-policy
> 
> 

Interesting links, thanks.


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/1371741712.11007.16.ca...@fast.cercy.net

Reply via email to