So I’ll be watching this space.

I’m curious 🧐 to see what “specific implementation” of “stenography” they used

I’m curious of this is going to be a “fingerprint” of who created this.

Different schools of hackers will use different types of this skill.

I also want more then
Fingerprint.

As we are talking about people who try to hide their work.

I don’t put is past CCP-Rus interest aligning. Where Fancy Bear takes credit for others work.

Again I don’t know why I keep thinking this is not a singular state.
I want to be specific here to why I think there is a tactical advantage to this.

The supply chain Attack FEELS like it plays really well into Chinese technical access.

Where the development of the code FEELS more Russian. In the informational and architectural knowledge
This thread is meant to be a musing of correlating information I feel should be added into the dialog for context

It’s not a professional view. Just an open square of Hmmm 🧐
You can follow @SirBedivier.
Tip: mention @twtextapp on a Twitter thread with the keyword “unroll” to get a link to it.

Latest Threads Unrolled:

By continuing to use the site, you are consenting to the use of cookies as explained in our Cookie Policy to improve your experience.