They said in the article they recreated it on their own. So it couldn’t just be the proof of concept.
This could mean they just put the files from the exploit on a drive and reproduced it. The author of the exploit claims it’s very complex and no one knows how it works yet.
Under cover/covert operations do actually happen.
So what’s the scenario they are protecting themselves against? Someone catching the agent right after they unlocked some encrypted drive with the USB drive still on them? It sounds very far fetched to me that FBI would request a backdroor from Microsoft with this very specific requirement. I think it’s more likely they would cover it on their side with some easily erasable USB drive. Plus such a solution would also let them get rid of the backdoor if they are caught before they used it.
It’s possible this was just added by the guy for his proof of concept, so I guess we’ll see when more information is released.
So what’s the scenario they are protecting themselves against?
I mean, if you had a USB backdoor why wouldn’t you automate the removal of evidence? It would make disposal a lot faster. You can just unplug it and physically destroy it to be safe.
I think it’s more likely they would cover it on their side with some easily erasable USB drive.
This could mean they just put the files from the exploit on a drive and reproduced it. The author of the exploit claims it’s very complex and no one knows how it works yet.
So what’s the scenario they are protecting themselves against? Someone catching the agent right after they unlocked some encrypted drive with the USB drive still on them? It sounds very far fetched to me that FBI would request a backdroor from Microsoft with this very specific requirement. I think it’s more likely they would cover it on their side with some easily erasable USB drive. Plus such a solution would also let them get rid of the backdoor if they are caught before they used it.
It’s possible this was just added by the guy for his proof of concept, so I guess we’ll see when more information is released.
I mean, if you had a USB backdoor why wouldn’t you automate the removal of evidence? It would make disposal a lot faster. You can just unplug it and physically destroy it to be safe.
Why not both? Redundancy never hurt.