Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×

+ - Replicating NSA's Gadgets Using Open Source

Submitted by Anonymous Coward
An anonymous reader writes "Wireless security researcher Michael Ossmann asked himself: "Could I make the gadgets that the agency uses to monitor and locate mobile phones, tap USB and Ethernet connections, maintain persistent malware on PCs, communicate with malware across air gaps, and more, by just using open source software and hardware?" In this podcast he shares his insights on what to use — and how — to duplicate hardware devices found in the ANT catalog."
This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

Replicating NSA's Gadgets Using Open Source

Comments Filter:

Real programmers don't bring brown-bag lunches. If the vending machine doesn't sell it, they don't eat it. Vending machines don't sell quiche.

Working...