Where the monsters live
The monsters read your full network traffic flow if they have your keys or you used weak ones.
The monsters are in the hidden partitions of USB flash drives left in parking lots and technical conferences.
The monsters are in the weakened smartphone OS that most of your users own.
The monsters are in the containers you used from that interesting GitHub pull.
The monsters are in the Cisco router where the Zero Day lives waiting for the NSA.
The monsters are in the fake certificates your user swallowed in their browsers.
The monsters are 10,000 CVEs that you never, ever checked.
The monsters live inside your kernel, watching for the network traffic that brings them alive from their zombie state.
To read this article in full or to leave a comment, please click here