I'm more interested in the inserted malware code package itself -- and how widespread it is among LinkedIn accounts -- than a routine MITM by GCHQ known to be sitting with permission on the internet backbones of BT (REMEDY Remedy), Verizon Business (DACRON), and Vodafone Cable (GERONTIC), Global Crossing (PINNAGE), Level 3 (LITTLE), Viatel (VITREOUS) and Interoute (STREETCAR).
Der Spiegel says they have located a Mach engineer in India on the receiving end of QI. Hopefully he had the sense to unplug from the internet before the malware could get wiped.
I wonder if GCHQ re-used some code from Flame. Might be some work here for Kapersky Labs.
Der Spiegel says they have located a Mach engineer in India on the receiving end of QI. Hopefully he had the sense to unplug from the internet before the malware could get wiped.
I wonder if GCHQ re-used some code from Flame. Might be some work here for Kapersky Labs.