To: Citizen Zed
Only step one is an attack and it's the only real technological hurdle. People have been hiding data streams in video for quite some time.
This article is like describing a bank robbery by how the criminals laundered the money.
5 posted on
10/20/2014 7:17:10 AM PDT by
Durus
(You can avoid reality, but you cannot avoid the consequences of avoiding reality. Ayn Rand)
To: Durus
Well said. Which tools do you need to perform these attacks even if the box is compromised?
7 posted on
10/20/2014 7:52:44 AM PDT by
gura
(If Allah is so great, why does he need fat sexually confused fanboys to do his dirty work? -iowahawk)
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson