From The Register:
“It’s not as bad as you thought – it’s much worse.”
A leaked NSA cyber-arms catalog has shed light on the technologies US and UK spies use to infiltrate and remotely control PCs, routers, firewalls, phones and software from some of the biggest names in IT.
The exploits, often delivered via the web, provide clandestine backdoor access across networks, allowing the intelligence services to carry out man-in-the-middle attacks that conventional security software has no chance of stopping.
And if that fails, agents can simply intercept your hardware deliveries from Amazon to install hidden gadgets that rat you out via radio communications.
Latest posts by agent139 (see all)
- Robert Stark talks to Jamie Curcio about Narrative Machines - Aug 15, 2017
- Buddha and the Slut Episode 8: Join My Cult! - Aug 8, 2017
- Virtualization of the Real and Omnipresence of the Virtual - Jul 31, 2017