Remix.run Logo
Zigurd 6 hours ago

Some systems, like lawful intercept, are designed to be hidden even from telco network management systems. The LI console that set up a wire tap might log activity at that particular console at that particular law-enforcement agency. But if you don't know where to look exactly, good luck.

This is why the Chinese picked lawful intercept as a hacking target for the salt typhoon exploit. It's almost impossible to know whether that exploit is continuing or when exactly it began.

ogurechny 6 hours ago | parent [-]

Someone else was targeting it long before the Chinese.