Administrivia

My PGP Public Key

I’ve now registered PGP keys through GPGtools for both my work and personal email addresses. If you’re trying to reach me on a sensitive topic, you can reach out to me at sean.gallagher at arstechnica dot com using the following public key to encrypt your message:

Short ID: 332B13CF
Key ID: E0A93113332B13CF
Fingerprint: 00FF E0BB B114 1A97 7A47 06F4 E0A9 3113 332B 13CF

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG/MacGPG2 v2.0.20 (Darwin)
Comment: GPGTools - https://gpgtools.org
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=5a+d
-----END PGP PUBLIC KEY BLOCK-----

Standard
NSA

NSA hacker in residence dishes on how to “hunt” system admins | Ars Technica

If you spend enough time perusing the Internet for helpful information on how to build a botnet or hack an online game, you’ll inevitably end up on a discussion board site filled with posts from various hackers eager to share that knowledge and build up their street cred. But even if you use Tor to explore the “dark Web” for such boards, you’ll never reach the 1337est board of them all—the discussion board hosted on the National Security Agency’s NSAnet.

The latest data dump from the archive of NSA webpages leaked by Edward Snowden contains a sampling of posts from the NSA’s internal hacker board by one author in particular—an NSA employee that The Intercept’s Ryan Gallagher and Peter Mass claim is the person who wrote presentations on attacking the Tor network. In one of his posts, the author outlines approaches to gaining access to networks used by individuals targeted for surveillance.

 

Read more of this post at Ars Technica: NSA hacker in residence dishes on how to “hunt” system admins | Ars Technica.

Standard