| ▲ | scottyah 3 hours ago | |||||||||||||
I think you are, the words make perfect sense. They know of a lot of attack attempts, and so far they have no reason to believe any were successful. Success can mean a lot of different things, why list it all out (were able to extract data, install malicious software, encrypt files with ransomware, delete any data, etc). | ||||||||||||||
| ▲ | quantified 2 hours ago | parent | next [-] | |||||||||||||
They can be perfectly aware of nation-state hacks. These are exactly the weasel qualifiers used by the NSA when they were claiming not to be watching the communications of US citizens. "No intercepts were made under program X" specifically sidesteps all the shady stuff under program Y. | ||||||||||||||
| ▲ | Veserv 3 hours ago | parent | prev | next [-] | |||||||||||||
They have a legal department carefully directing what they say. In a court of law, their lawyers will successfully argue that they are beholden to only the precise letter of their statement. Are you arguing that their lawyers are incompetent and imprecise in their wording? If so, what evidence do you have that their lawyers are incompetent? In light of the correct legal interpretation of their words, being only the specific letters, we can see that your interpretation is incorrect. > They know of a lot of attack attempts No, their statement says nothing about attack attempts. > so far they have no reason to believe any were successful No, their statement says nothing about their belief, only their explicit knowledge. Their statement says nothing about their investigation practices or whether they even attempted to investigate and learn about attacks. Their statement says nothing about non-mercenary attacks. Their statement is technically correct as long as any successful attacks they know about are not explicitly known to be committed by mercenarys. | ||||||||||||||
| ||||||||||||||
| ▲ | sally_glance 3 hours ago | parent | prev [-] | |||||||||||||
How do you know their definition isn't only "received extortion letters" and "exfiltrate data" is fine as long as it didn't lead to the former? | ||||||||||||||