chore: replace broken links part 2
All checks were successful
Website build and deploy / build (push) Successful in 1m24s
All checks were successful
Website build and deploy / build (push) Successful in 1m24s
This commit is contained in:
@@ -17,7 +17,7 @@ In my opinion, the latest NSA leaks reached a new level of boldness. Oh wait, ma
|
||||
|
||||
{{< figure src="/img/blog/nsa-headwater-screen.jpg" caption="NSA Headwater Implant" >}}
|
||||
|
||||
But as the introducting sentence states, the latest information of NSA’s mass surveillance goes much further than only spying in social networks and intercepting phone calls. **This time, it’s about your home and your network itself**. To be concrete: It’s about your router located somewhere in your rooms. Internal, top secret classified presentations show that NSA is actively searching for [vulnerabilities in industry and home routers](www.wired.com/threatlevel/2013/09/nsa-router-hacking/) and is [buying exploits](http://www.afterdawn.com/news/article.cfm/2013/09/22/nsa_buys_zero_day_exploits_from_vupen) if needed. And if all of these steps aren’t enough, they just [implant a backdoor chip](http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html) granting full remote access.
|
||||
But as the introducting sentence states, the latest information of NSA’s mass surveillance goes much further than only spying in social networks and intercepting phone calls. **This time, it’s about your home and your network itself**. To be concrete: It’s about your router located somewhere in your rooms. Internal, top secret classified presentations show that NSA is actively searching for [vulnerabilities in industry and home routers](https://www.wired.com/2013/09/nsa-router-hacking/) and is [buying exploits](http://www.afterdawn.com/news/article.cfm/2013/09/22/nsa_buys_zero_day_exploits_from_vupen) if needed. And if all of these steps aren’t enough, they just [implant a backdoor chip](http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html) granting full remote access.
|
||||
|
||||
If you hear about an massively exploited vulnerability or a cooperating router vendor, I would expect you to switch the router or at least install updated/other firmware on the device. But what if you are not able to this because your Internet Service Provider (ISP) forces you to use his and no other device?
|
||||
|
||||
|
||||
@@ -27,4 +27,4 @@ On this occasion I would like to thank Michael and Vincent for their contributio
|
||||
|
||||
[1]: https://git.fsfe.org/fsfe-system-hackers/fsfe-planet
|
||||
[2]: https://fsfe.org
|
||||
[3]: https://fsfe.org/contact/
|
||||
[3]: https://fsfe.org/about/contact/
|
||||
|
||||
@@ -29,7 +29,7 @@ Meine Angebote enthalten möglicherweise Links zu externen Webseiten Dritter, au
|
||||
|
||||
### Urheberrecht
|
||||
|
||||
Sämtliche Inhalte dieser Webseiten stehen - soweit nicht anders vermerkt - unter der CC BY-SA 4.0-Lizenz: http://creativecommons.org/licenses/by-sa/4.0/de
|
||||
Sämtliche Inhalte dieser Webseiten stehen - soweit nicht anders vermerkt - unter der CC BY-SA 4.0-Lizenz: https://creativecommons.org/licenses/by-sa/4.0/
|
||||
|
||||
Soweit die Inhalte auf dieser Seite nicht vom Betreiber erstellt wurden, werden die Urheberrechte Dritter beachtet. Insbesondere werden Inhalte Dritter als solche gekennzeichnet. Sollten Sie trotzdem auf eine Urheberrechtsverletzung aufmerksam werden, bitte ich um einen entsprechenden Hinweis. Bei Bekanntwerden von Rechtsverletzungen werde ich derartige Inhalte umgehend entfernen.
|
||||
|
||||
|
||||
Reference in New Issue
Block a user