Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: Citizen Zed
Only step one is an attack and it's the only real technological hurdle. People have been hiding data streams in video for quite some time.

This article is like describing a bank robbery by how the criminals laundered the money.

5 posted on 10/20/2014 7:17:10 AM PDT by Durus (You can avoid reality, but you cannot avoid the consequences of avoiding reality. Ayn Rand)
[ Post Reply | Private Reply | To 1 | View Replies ]


To: Durus

Well said. Which tools do you need to perform these attacks even if the box is compromised?


7 posted on 10/20/2014 7:52:44 AM PDT by gura (If Allah is so great, why does he need fat sexually confused fanboys to do his dirty work? -iowahawk)
[ Post Reply | Private Reply | To 5 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson