From The Register:
“It’s not as bad as you thought – it’s much worse.”
A leaked NSA cyber-arms catalog has shed light on the technologies US and UK spies use to infiltrate and remotely control PCs, routers, firewalls, phones and software from some of the biggest names in IT.
The exploits, often delivered via the web, provide clandestine backdoor access across networks, allowing the intelligence services to carry out man-in-the-middle attacks that conventional security software has no chance of stopping.
And if that fails, agents can simply intercept your hardware deliveries from Amazon to install hidden gadgets that rat you out via radio communications.
Latest posts by agent139 (see all)
- News and Lies 2: We Can Weaponize Fiction, But How Do We Monetize Truth? - Dec 1, 2016
- News and Lies 1: In Defense of (some) Propaganda - Nov 29, 2016
- Sacred Clowns and The Basis of Terror - Oct 10, 2016