he message arrived at night and consisted of three words: “Good evening sir!”
The sender was a hacker who had written a series of provocative memos at the National Security Agency. His secret memos had explained — with an earthy use of slang and emojis that was unusual for an operative of the largest eavesdropping organization in the world — how the NSA breaks into the digital accounts of people who manage computer networks, and how it tries to unmask people who use Tor to browse the web anonymously. Outlining some of the NSA’s most sensitive activities, the memos were leaked by Edward Snowden, and I had written about a few of them for The Intercept.
There is no Miss Manners for exchanging pleasantries with a man the government has trained to be the digital equivalent of a Navy SEAL. Though I had initiated the contact, I was wary of how he might respond. The hacker had publicly expressed a visceral dislike for Snowden and had accused The Intercept of jeopardizing lives by publishing classified information. One of his memos outlined the ways the NSA reroutes (or “shapes”) the internet traffic of entire countries, and another memo was titled “I Hunt Sysadmins.” I felt sure he could hack anyone’s computer, including mine.
Good evening sir!
1More
1More
Linux Foundation Security Checklist: Have It Your Way | Community | LinuxInsider - 0 views
1More
[# ! #Open #Tech:] How to Recover a Deleted File in Linux - 1 views
1More
20 Command Line Tools to Monitor Linux Performance - 1 views
2More
CentOS / Redhat Iptables Firewall Configuration Tutorial - 0 views
1More
The Top 20 Free Network Monitoring and Analysis Tools for Sys Admins - 0 views
1 - 10 of 10
Showing 20▼ items per page