Ξ welcome to cryptostorm's member forums ~ you don't have to be a cryptostorm member to post here Ξ
∞ take a peek at our legendary cryptostorm_is twitter feed if you're into that kind of thing ∞
Ξ we're rolling out voodoo network security across cryptostorm - big things happening, indeed! Ξ
Ξ any OpenVPN configs found on the forum are likely outdated. For the latest, visit GitHub Ξ
To stay ahead of new and evolving threats, cryptostorm has always looked out past standard network security tools. Here, we discuss and fine-tune our work in bringing newly-created capabilities and newly-discovered knowledge to bear as we keep cryptostorm in the forefront of tomorrow's network security landscape.
- Site Admin
- Posts: 994
- Joined: Wed Feb 05, 2014 3:47 am
, because it doesn't do anything to the compromised machine except send the machine's MAC address and Windows hostname to a server in Virginia using the machine's real IP address. The idea that the FBI could be involved with malware is not too outlandish; revelations from Edward Snowden have already revealed that the NSA does much the same thing.
Return to “cryptostorm reborn: voodoo networking, stormtokens, PostVPN exotic netsecurity”
Who is online
Users browsing this forum: No registered users and 3 guests