Hacker News new | past | comments | ask | show | jobs | submit login

Stuxnet has been well broken down and described. It had nothing to do with iPods with surreptitious recording capabilities.



Since you are an expert, can you explain the zero day that would be needed to get Stuxnet onto the SCADA/first computer?

Obviously the final product might not have used this iPod. It was a huge operation on many levels with failed projects. This iPod also obviously might not have been for recording, since that's a level one misdirect, oh it's secret spy recording device, person who's watched to much James Bond.

But how did they do the 'usb' zero day since you know it isn't a iPod?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: