-
17th October 2018 19:42
Link to Post #41
Re: Apparently China just can't resist embedding spyware (It's worse - lots worse. See Post #32)
Certainly we have heard of corrupted firmware in hard drives.. Corrupted hardware though as Paul says which would not go off until some controlled event happens.. And then systems which are not on the internet, or arpanet in-house.. If they've networked in-house, how soon before some other device is able to leak out what has been captured, in a non-obvious "networked" way? How about information destruction, where it takes a multitude of those "secure machines" doing an action where the sum total of the machines then creates the "deed", not just one machine with only a portion of the "code" to be carried out - distributed processing and distributed "activity".. an in-house viral network in other words, right in the middle of an ultra-secure (off the grid) military network..
Seems to me cat and mice and how rats and mazes and webs are created will define how deep it goes.
My point being the military IS circulating to all it's subscribers, that the argument from Apple and others thusly compromised is real, and to take Apple and other's poo poo'ing the attacks as mis-information fluff..
-
17th October 2018 20:00
Link to Post #42