On 2/24/19 11:08 AM, Nex wrote:
> On 2/23/19 11:07 AM, Scott Rea via dev-security-policy wrote:
>> G’day Wayne et al,
>>
>> In response to your post overnight (included below), I want to assure you 
>> that DarkMatter’s work is solely focused on defensive cyber security, secure 
>> communications and digital transformation. We have never, nor will we ever, 
>> operate or manage non-defensive cyber activities against any nationality.
>>
>> Furthermore, in the spirit of transparency, we have published all our public 
>> trust TLS certificates to appropriate CT log facilities (including even all 
>> our OV certificates) before this was even a requirement.  We have been 
>> entirely transparent in our operations and with our clients as we consider 
>> this a vital component of establishing and maintaining trust.
>>
>> We have used FIPS certified HSMs as our source of randomness in creating our 
>> Authority certificates, so we have opened an investigation based on Corey 
>> Bonnell’s earlier post regarding serial numbers and will produce a 
>> corresponding bug report on the findings.
>>
>> I trust this answers your concerns and we can continue the Root inclusion 
>> onboarding process.
> 
> For clarity, are you rejecting all of the following articles and blog
> posts as false and fabricated?
> 
> 1. https://www.reuters.com/investigates/special-report/usa-spying-raven/
> 2.
> https://theintercept.com/2016/10/24/darkmatter-united-arab-emirates-spies-for-hire/
> 3.
> https://www.evilsocket.net/2016/07/27/How-The-United-Arab-Emirates-Intelligence-Tried-to-Hire-me-to-Spy-on-its-People/

The New York Times just published another investigative report that
mentions DarkMatter at length, with additional testimonies going on the
record:

4.
https://www.nytimes.com/2019/03/21/us/politics/government-hackers-nso-darkmatter.html
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to