You can login if you already have an account or register by clicking the button below.
Registering is free and all you need is a username and password. We never ask you for your e-mail.
[–]Antikaon[S]0 points
2 points
2 points
(+2|-0)
ago
I suspect these exploits and tools are what they use once the target has been hacked. The details of how the initial hacks occur will probably be revealed later. Wikileaks is releasing this stuff in batches similar to the Podesta/DNC leaks. The dirtiest details came later in those cases.
view the rest of the comments →
[–] Antikaon [S] 0 points 2 points 2 points (+2|-0) ago
I suspect these exploits and tools are what they use once the target has been hacked. The details of how the initial hacks occur will probably be revealed later. Wikileaks is releasing this stuff in batches similar to the Podesta/DNC leaks. The dirtiest details came later in those cases.