It's a bit late, but I can answer the question. Replace the word "implant" with "rootkit" or "backdoor", and things make a lot more sense.
On Sun, Jul 9, 2017 at 1:22 AM, Jim <jimmy...@copper.net> wrote: > Tom Tom wrote: >> >> http://thehackernews.com/2017/07/ssh-credential-hacking.html?m=1 >> >> This post could be helpful. But how CIA could unveil the encryption? >> Interesting and horrable... > > > As I understand it they are not attacking the encryption itself. but > rather harvesting the keys from the running (client) machine using > "implants". The attack vectors for Windows and Linux machines are > different. > > Unfortunately I am just left guessing about the word "implant". Doing > an internet search didn't help me. My understanding is on Linux systems > the "implant" is a kernel level root kit. I'd appreciate responses from > anybody having a better grasp of this. > > Jim > > > -- > tor-talk mailing list - tor-talk@lists.torproject.org > To unsubscribe or change other settings go to > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk