(Replying to PARENT post)

This was an amusing read. Unsurprisingly, you can learn some basic things about how three letter agencies operate from job postings. There was also an interesting issue that happened in 2013, a WaPo article listed some names of various programs and people subsequently were able to find additional names of programs by searching Linkedin profiles [1]. The NSA has a Github full of open-sourced tools, besides Ghrida [2]. And the NSA also has a youtube channel [3]. I came across a short 15 minute film about a cyber training exercise the NSA held in 2018. Seemed like a more involved CTF event, with a bring your own device policy, with most people running windows and using a VM when necessary and some people using linux, at least one person using Ubuntu.

It's funny that the response to a FOIA sounds so general and opaque that it makes the existence of these topics feel like matters of national security. Maybe asking about about this advisory [4] could help hit Ubuntu. Searching the National Cryptologic Museum for IBM related things could help hit some ancient DOS.

1. https://www.techdirt.com/2013/06/18/discovering-names-secret...

2. https://github.com/NationalSecurityAgency

3. https://www.youtube.com/watch?v=KQcAx00RzXQ

4. https://www.fbi.gov/news/press-releases/press-releases/nsa-a...

5. https://nsa.sfo2.digitaloceanspaces.com/comp3321.pdf

๐Ÿ‘คknaik94๐Ÿ•‘3y๐Ÿ”ผ0๐Ÿ—จ๏ธ0

(Replying to PARENT post)

Considering past events such as this.[1] I think it is more likely that the F.B.I are aware of TAILS and its limitations against certain adversaries and choose not to comment.

[1]: https://gizmodo.com/report-facebook-helped-the-fbi-exploit-v...

๐Ÿ‘คRonMarken๐Ÿ•‘3y๐Ÿ”ผ0๐Ÿ—จ๏ธ0