Hacker Newsnew | past | comments | ask | show | jobs | submit | bro666's commentslogin

I'm more interested in the inserted malware code package itself -- and how widespread it is among LinkedIn accounts -- than a routine MITM by GCHQ known to be sitting with permission on the internet backbones of BT (REMEDY Remedy), Verizon Business (DACRON), and Vodafone Cable (GERONTIC), Global Crossing (PINNAGE), Level 3 (LITTLE), Viatel (VITREOUS) and Interoute (STREETCAR).

Der Spiegel says they have located a Mach engineer in India on the receiving end of QI. Hopefully he had the sense to unplug from the internet before the malware could get wiped.

I wonder if GCHQ re-used some code from Flame. Might be some work here for Kapersky Labs.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: