Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×

+ - Replicating NSA's Gadgets Using Open Source

Submitted by Anonymous Coward
An anonymous reader writes "Wireless security researcher Michael Ossmann asked himself: "Could I make the gadgets that the agency uses to monitor and locate mobile phones, tap USB and Ethernet connections, maintain persistent malware on PCs, communicate with malware across air gaps, and more, by just using open source software and hardware?" In this podcast he shares his insights on what to use — and how — to duplicate hardware devices found in the ANT catalog."
This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

Replicating NSA's Gadgets Using Open Source

Comments Filter:

Disclaimer: "These opinions are my own, though for a small fee they be yours too." -- Dave Haynie

Working...