[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Can we legally borrow some sploits from TLAs?
- To: [email protected]
- Subject: Can we legally borrow some sploits from TLAs?
- From: [email protected] (Georgi Guninski)
- Date: Sat, 26 Mar 2016 09:14:36 +0200
- In-reply-to: <CAD2Ti2-UNgwPOqm5rWfJ7efv+A=kgO4vqhT4P2-G6CdnaH1-2w@mail.gmail.com>
- References: <[email protected]$> <CAD2Ti2-UNgwPOqm5rWfJ7efv+A=kgO4vqhT4P2-G6CdnaH1-2w@mail.gmail.com>
On Sat, Mar 26, 2016 at 12:53:45AM -0400, grarpamp wrote:
> Plenty of honeypot research groups you can search for and join.
> (Or engineer your way into.)
> Though your TLA's already did and know the list of boxes not to hit.
Isn't this very good defense if true?
How they passively recognize honeypot which is disposable computer
connected to public wifi and then possibly over Tor/public proxy?