<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=ISO-8859-1">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    If you're going to read this: <a
href="http://labs.bitdefender.com/2012/06/flame-the-story-of-leaked-data-carried-by-human-vector/">http://labs.bitdefender.com/2012/06/flame-the-story-of-leaked-data-carried-by-human-vector/<br>
    </a>(which you should) then you have to read it listening to <a
      href="http://www.youtube.com/watch?v=PVi8bJFIac8">this</a> or <a
      href="http://www.youtube.com/watch?v=z5X5zh00rdg">this</a>. That
    plus the crypto-windows-update technique makes it a work of art.<br>
    <br>
    The take-away is that controlling the emergent behavior of your
    opponent's information infrastructure with replicant techniques is
    ... <a href="http://www.youtube.com/watch?v=eFVi-j-yIr0">effective</a>.<br>
    <br>
    -dave<br>
    <br>
    <br>
    <pre class="moz-signature" cols="72">-- 
INFILTRATE - the world's best offensive information security conference.
April 2013 in Miami Beach
<a class="moz-txt-link-abbreviated" href="http://www.infiltratecon.com">www.infiltratecon.com</a>
</pre>
  </body>
</html>