TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Learning from the Enemy: The Gunman Project (2007) [pdf]

78 点作者 grouchysmurf将近 10 年前

7 条评论

unbehagen将近 10 年前
"As a totalitarian society, the Soviet Union valued eavesdropping and thus developed ingenious methods to accomplish it." (page 2)
评论 #9954913 未加载
评论 #9955707 未加载
评论 #9954646 未加载
评论 #9954854 未加载
评论 #9955682 未加载
评论 #9957566 未加载
评论 #9955496 未加载
jpatokal将近 10 年前
The article mentions the listening bug in the Great Seal in a side note, but it&#x27;s arguably an even better hack:<p><a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;The_Thing_%28listening_device%29" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;The_Thing_%28listening_device%...</a>
评论 #9955098 未加载
adriancooney将近 10 年前
&quot;Keeping track of all the various software was hard enough, but keeping track of all of the variations [in the software] was a nightmare.&quot;<p>Sounds all too familiar.
huhtenberg将近 10 年前
The &quot;How it worked&quot; part is in &quot;Implant Characteristics&quot; section, Page 16 of the PDF and forward.
评论 #9955264 未加载
wglb将近 10 年前
Ah, when your adversary knows more about your stuff than you do.
JupiterMoon将近 10 年前
Is there anyone else reluctant to open a pdf from the NSA?
评论 #9954425 未加载
评论 #9954693 未加载
评论 #9954572 未加载
评论 #9954434 未加载
评论 #9956105 未加载
评论 #9955781 未加载
tempodox将近 10 年前
The dates associated with this document seem confusing and contradictory. I can only assume that&#x27;s intentional.<p>I&#x27;ll also not be surprised if it makes my computer self-destruct via spontaneous self-combustion after reading.