diff --git a/project/blog/templates/blog/pagers.html b/project/blog/templates/blog/pagers.html index 134ef8a..989f8d2 100644 --- a/project/blog/templates/blog/pagers.html +++ b/project/blog/templates/blog/pagers.html @@ -30,11 +30,11 @@
Hardware supply chain attacks are extremely hard to defend from. -
Once the hardware is successfully modified, adversaries can use the back door to gain further access or exfiltrate data, it is extremely difficult to detect and fix, and gives long-term access. It is entirely possible that explosives planted in the pagers were detonated using a remote command, perhaps hidden in a pager message. But erm? there is not much space in the devices. Which explosives were that then?
+Once the hardware is successfully modified, adversaries can use the back door to gain further access or exfiltrate data, it is difficult to detect and fix, and gives long-term access. It is entirely possible that explosives planted in the pagers were detonated using a remote command, perhaps hidden in a pager message. But erm? there is not much space in the devices. Which explosives were that then?
To make it a targeted attack the attacker would need an operative to make sure he modified devices are delivered to the targets and not just anyone. This requires a mole, or a bribe. And time. How long does it take to infiltrate Hezbollah providers to the point of delivering hundreds of devices?
+To make it a targeted attack the attacker would need an operative to make sure the modified devices are delivered to the targets and not just anyone. This requires a mole, or a bribe. And time. How long does it take to infiltrate Hezbollah providers to the point of delivering hundreds of devices?
Hardware supply chain attacks are extremely hard to defend from. -
Once the hardware is successfully modified, adversaries can use the back door to gain further access or exfiltrate data, it is extremely difficult to detect and fix, and gives long-term access. It is entirely possible that explosives planted in the pagers were detonated using a remote command, perhaps hidden in a pager message. But erm? there is not much space in the devices. Which explosives were that then?
+Once the hardware is successfully modified, adversaries can use the back door to gain further access or exfiltrate data, it is difficult to detect and fix, and gives long-term access. It is entirely possible that explosives planted in the pagers were detonated using a remote command, perhaps hidden in a pager message. But erm? there is not much space in the devices. Which explosives were that then?
To make it a targeted attack the attacker would need an operative to make sure he modified devices are delivered to the targets and not just anyone. This requires a mole, or a bribe. And time. How long does it take to infiltrate Hezbollah providers to the point of delivering hundreds of devices?
+To make it a targeted attack the attacker would need an operative to make sure the modified devices are delivered to the targets and not just anyone. This requires a mole, or a bribe. And time. How long does it take to infiltrate Hezbollah providers to the point of delivering hundreds of devices?