Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

We should just assume that all entities with both the resources and motivation to discover and exploit massive security vulnerabilities now have a database of every object in their NGNIX modules' memory since the leak sprung roughly 4 months ago.

Right now they'll be querying for political blackmail and insider material, then they will turn to Joe Schmoe who only gets his news from the television, where no doubt this will never be discussed. They will effortlessly and listlessly categorize the data largely as an automated process.

If we expect anything less, it's possible we are underestimating our adversaries. Better to overestimate them and feel embarrassed later when you later find out you were just being paranoid.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: