Comments on: When a surveillance state hacking firm gets hacked https://www.emsisoft.com/en/blog/17676/when-a-surveillance-state-hacking-firm-gets-hacked/ Straight-talking security advice from the Malware Experts Fri, 18 Nov 2022 12:17:06 +0000 hourly 1 By: Michael Stidham https://www.emsisoft.com/en/blog/17676/when-a-surveillance-state-hacking-firm-gets-hacked/#comment-491025 Thu, 17 Dec 2015 08:42:00 +0000 http://blog.emsisoft.com/?p=17676#comment-491025 This is one of the best article yet from Emsisoft! Keep up the good work. This one had a wealth of knowledge.

]]>
By: Philip https://www.emsisoft.com/en/blog/17676/when-a-surveillance-state-hacking-firm-gets-hacked/#comment-457897 Thu, 09 Jul 2015 14:01:00 +0000 http://blog.emsisoft.com/?p=17676#comment-457897 Hacking team could not decrypt encrypted data the e-mail said they could “read the document before it was encrypted making encryption obsolete.” The statement about being able to read encrypted data was not your error it is on one of your links that is making such a error statement. They could not decrypt the encrypted data they could read the file before it was encrypted and they boasted that that made encryption obsolete. Most of those spyware programs when you test them out after they have been discovered.. They slow down your Windows computer system and you can sense that something is wrong. When I did the same with the Linux Debian, desktop spyware version which also worked on its variants Ubuntu, and so on I didn’t get the speeding up and slowing down side effects. I wish there was a two-way interactive decent desktop firewall for the Linux desktop systems. Looking at their log files after-the-fact is pointless. Not only that I couldn’t find it on outgoing log files on Debian. I’m just useless.

]]>