Hacker News
- Your USB cable, the spy: the NSA’s catalog of surveillance magic (2013) http://arstechnica.com/information-technology/2013/12/inside-the-nsas-leaked-catalog-of-surveillance-magic/ 48 comments
- Your USB cable, the spy: Inside the NSA’s catalog of surveillance magic http://arstechnica.com/information-technology/2013/12/inside-the-nsas-leaked-catalog-of-surveillance-magic/ 29 comments
- Your USB cable, the spy: Inside the NSA’s catalog of surveillance magic | Latest batch of documents from Snowden shows NSA's power to pwn. http://arstechnica.com/information-technology/2013/12/inside-the-nsas-leaked-catalog-of-surveillance-magic/ 10 comments worldnews
Linking pages
- Report: Apple designing its own servers to avoid snooping | Ars Technica http://arstechnica.com/information-technology/2016/03/report-apple-designing-its-own-servers-to-avoid-snooping/ 162 comments
- Meet USBee, the malware that uses USB drives to covertly jump airgaps | Ars Technica http://arstechnica.com/security/2016/08/meet-usbee-the-malware-that-uses-usb-drives-to-covertly-jump-airgaps/ 48 comments
- Hackers can use just-fixed Intel bugs to install malicious firmware on PCs | Ars Technica https://arstechnica.com/information-technology/2020/11/intel-patches-high-severity-bugs-protecting-lost-stolen-or-confiscated-pcs/ 14 comments
- The NSA Playset: Espionage tools for the rest of us | Ars Technica http://arstechnica.com/information-technology/2015/08/the-nsa-playset-espionage-tools-for-the-rest-of-us/ 7 comments
- Researchers bridge air gap by turning monitors into FM radios | Ars Technica http://arstechnica.com/security/2014/11/researchers-bridge-air-gap-by-turning-monitors-into-fm-radios/ 5 comments
- NSA contractor arrested, criminally charged with stealing secrets | Ars Technica http://arstechnica.com/tech-policy/2016/10/doj-arrests-govt-contractor-accused-of-taking-highly-classified-data/ 4 comments
- How hackers could attack hard drives to create a pervasive backdoor | Ars Technica http://arstechnica.com/information-technology/2015/02/how-hackers-could-attack-hard-drives-to-create-a-pervasive-backdoor/ 4 comments
- Huawei 5G, The UK Gets A Lesson In Go · Privacy, Power, & Protection In The Cyber Century https://blog.eutopian.io/huawei-5g-the-uk-gets-a-lesson-in-go/ 0 comments
- NSA secretly hijacked existing malware to spy on N. Korea, others | Ars Technica http://arstechnica.com/information-technology/2015/01/nsa-secretly-hijacked-existing-malware-to-spy-on-n-korea-others/ 0 comments
- SensePost | Universal serial abuse https://www.sensepost.com/blog/2016/universal-serial-abuse/ 0 comments
- Meet USBee, the malware that uses USB drives to covertly jump airgaps | Ars Technica http://arstechnica.com/security/2016/08/meet-usbee-the-malware-that-uses-usb-drives-to-covertly-jump-airgaps/?href= 0 comments
- Playing NSA, hardware hackers build USB cable that can attack | Ars Technica http://arstechnica.com/information-technology/2015/01/playing-nsa-hardware-hackers-build-usb-cable-that-can-attack/ 0 comments
Linked pages
- Catalog Reveals NSA Has Back Doors for Numerous Devices - DER SPIEGEL http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html 4750 comments
- Op-ed: Why Obama should pardon Edward Snowden | Ars Technica http://arstechnica.com/tech-policy/2016/09/op-ed-why-obama-should-pardon-edward-snowden/ 1 comment
- Snowden to President Obama: I deserve a pardon | Ars Technica http://arstechnica.com/tech-policy/2016/09/snowden-to-president-obama-i-deserve-a-pardon/ 0 comments
- Op-ed: Why President Obama won’t, and shouldn’t, pardon Snowden | Ars Technica http://arstechnica.com/tech-policy/2016/09/op-ed-why-president-obama-wont-and-shouldnt-pardon-snowden/ 0 comments
- Building a panopticon: The evolution of the NSA’s XKeyscore | Ars Technica http://arstechnica.com/information-technology/2013/08/building-a-panopticon-the-evolution-of-the-nsas-xkeyscore/ 0 comments
Related searches:
Search whole site: site:arstechnica.com
Search title: Your USB cable, the spy: Inside the NSA’s catalog of surveillance magic | Ars Technica
See how to search.