SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Strategies & Market Trends : 2026 TeoTwawKi ... 2032 Darkest Interregnum
GLD 387.39+0.5%Dec 9 4:00 PM EST

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: Pogeu Mahone who wrote (133703)5/13/2017 5:06:53 PM
From: TobagoJack  Read Replies (1) of 218304
 
(1) the story smells bad

<<The time that @malwaretechblog registered the domain was too late to help Europe and Asia>>

more likely script, that

- nsa wanted to test weapons of mass internet destruction

- machinated a malware leak

- released the weapon

- noted the result

- stopped the weapon by either leaking the solution, or <<with the help of Darien Huss from security firm Proofpoint>>

(2) observe that any other explanation would be alarming, like ebola genuinely gone airborne and out of true control

- the entire infection cycle was tee-ed up by Proofpoint

- genuine non-state hacker-launched malware attack

(3) issue, now that folks know the testing protocol and software routine, can adapt other nsa-originated malware by first neutering kill-switch code, then go weapons-free

(4) in any case, dawn of new age

the night that JPM accounts looted to zero is not far off, concurrently along with a much smaller (probably of a small nation) bank

the clients of the smaller bank would be made an example for all.

let us watch & brief
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext