Quote:
Originally Posted by KaliC
I never understood this, most security blocks any systems trying to crack a password. Not matter how much power if the IP is blocked after 5 fails and there is a million differant options that would take a 200k IPs.
|
The traffic (packets) is intercepted and stored to be encrypted before they reach the destination server -- then the process could be reversed intercepting the traffic (packets) containing the response to the client.
Security software on a server would be meaningless -- this is not a password cracking attack -- it is a traffic (packets) interception.
Anyone sophisticated would just encrypt text communications with very long random passwords. So, either terrorists and criminals are very stupid or a lot of this is intentional disinformation leaked. There are inconsistancies
from
http://www.spiegel.de/media/media-35534.pdf
Code:
%PDF-1.3
%âãÏÓ
1 0 obj
<<>>
endobj
2 0 obj
<</Pages 3 0 R /Type /Catalog>>
endobj
3 0 obj
<</Count 16 /Kids
[4 0 R 9 0 R 14 0 R 19 0 R 24 0 R 29 0 R 34 0 R 39 0 R 44 0 R 49 0 R
54 0 R 59 0 R 64 0 R 69 0 R 74 0 R 79 0 R]
/Type /Pages>>
endobj
VIM - Vi IMproved
version 7.4.52
by Bram Moolenaar et al.
Modified by [email protected]
Vim is open source and freely distributable
Quote:
History Documentation of PDF version 1.3 was published in July 2000 in association with the release of Acrobat version 4. PDF 1.4 was published in November 2001, and corresponds to Acrobat version 5.
PDF_1_3, PDF Versions 1.0-1.3
|
So, we are to believe that this document was made on Acrobat 4 on February, 2012 (the date is 1/2 horizontally obscured)? Does that all seem a little strange to you? This raises a lot of red flags with me.
I have found other inconsistencies in some of these Snowden leaked documents so far too. I am skeptical of all of this from what i have seen ...