diff --git a/project/blog/templates/blog/pagers.html b/project/blog/templates/blog/pagers.html index 134ef8a..989f8d2 100644 --- a/project/blog/templates/blog/pagers.html +++ b/project/blog/templates/blog/pagers.html @@ -30,11 +30,11 @@

Interdiction

Hardware supply chain attacks are extremely hard to defend from. -

Once the hardware is successfully modified, adversaries can use the back door to gain further access or exfiltrate data, it is extremely difficult to detect and fix, and gives long-term access. It is entirely possible that explosives planted in the pagers were detonated using a remote command, perhaps hidden in a pager message. But erm? there is not much space in the devices. Which explosives were that then?

+

Once the hardware is successfully modified, adversaries can use the back door to gain further access or exfiltrate data, it is difficult to detect and fix, and gives long-term access. It is entirely possible that explosives planted in the pagers were detonated using a remote command, perhaps hidden in a pager message. But erm? there is not much space in the devices. Which explosives were that then?

Targeting costs

-

To make it a targeted attack the attacker would need an operative to make sure he modified devices are delivered to the targets and not just anyone. This requires a mole, or a bribe. And time. How long does it take to infiltrate Hezbollah providers to the point of delivering hundreds of devices?

+

To make it a targeted attack the attacker would need an operative to make sure the modified devices are delivered to the targets and not just anyone. This requires a mole, or a bribe. And time. How long does it take to infiltrate Hezbollah providers to the point of delivering hundreds of devices?

Why this attack?

diff --git a/project/build/pagers/index.html b/project/build/pagers/index.html index 401ca5e..b0f99f3 100644 --- a/project/build/pagers/index.html +++ b/project/build/pagers/index.html @@ -80,11 +80,11 @@

Interdiction

Hardware supply chain attacks are extremely hard to defend from. -

Once the hardware is successfully modified, adversaries can use the back door to gain further access or exfiltrate data, it is extremely difficult to detect and fix, and gives long-term access. It is entirely possible that explosives planted in the pagers were detonated using a remote command, perhaps hidden in a pager message. But erm? there is not much space in the devices. Which explosives were that then?

+

Once the hardware is successfully modified, adversaries can use the back door to gain further access or exfiltrate data, it is difficult to detect and fix, and gives long-term access. It is entirely possible that explosives planted in the pagers were detonated using a remote command, perhaps hidden in a pager message. But erm? there is not much space in the devices. Which explosives were that then?

Targeting costs

-

To make it a targeted attack the attacker would need an operative to make sure he modified devices are delivered to the targets and not just anyone. This requires a mole, or a bribe. And time. How long does it take to infiltrate Hezbollah providers to the point of delivering hundreds of devices?

+

To make it a targeted attack the attacker would need an operative to make sure the modified devices are delivered to the targets and not just anyone. This requires a mole, or a bribe. And time. How long does it take to infiltrate Hezbollah providers to the point of delivering hundreds of devices?

Why this attack?