id sid tid token lemma pos blog-dshr-org-7824 1 1 DSHR DSHR NNP blog-dshr-org-7824 1 2 's 's POS blog-dshr-org-7824 1 3 Blog blog NN blog-dshr-org-7824 1 4 : : : blog-dshr-org-7824 1 5 Securing secure VBG blog-dshr-org-7824 1 6 The the DT blog-dshr-org-7824 1 7 Software Software NNP blog-dshr-org-7824 1 8 Supply Supply NNP blog-dshr-org-7824 1 9 Chain Chain NNP blog-dshr-org-7824 1 10 DSHR DSHR NNP blog-dshr-org-7824 1 11 's 's POS blog-dshr-org-7824 1 12 Blog Blog NNP blog-dshr-org-7824 1 13 I -PRON- PRP blog-dshr-org-7824 1 14 'm be VBP blog-dshr-org-7824 1 15 David David NNP blog-dshr-org-7824 1 16 Rosenthal Rosenthal NNP blog-dshr-org-7824 1 17 , , , blog-dshr-org-7824 1 18 and and CC blog-dshr-org-7824 1 19 this this DT blog-dshr-org-7824 1 20 is be VBZ blog-dshr-org-7824 1 21 a a DT blog-dshr-org-7824 1 22 place place NN blog-dshr-org-7824 1 23 to to TO blog-dshr-org-7824 1 24 discuss discuss VB blog-dshr-org-7824 1 25 the the DT blog-dshr-org-7824 1 26 work work NN blog-dshr-org-7824 1 27 I -PRON- PRP blog-dshr-org-7824 1 28 'm be VBP blog-dshr-org-7824 1 29 doing do VBG blog-dshr-org-7824 1 30 in in IN blog-dshr-org-7824 1 31 Digital Digital NNP blog-dshr-org-7824 1 32 Preservation Preservation NNP blog-dshr-org-7824 1 33 . . . blog-dshr-org-7824 2 1 Tuesday Tuesday NNP blog-dshr-org-7824 2 2 , , , blog-dshr-org-7824 2 3 December December NNP blog-dshr-org-7824 2 4 18 18 CD blog-dshr-org-7824 2 5 , , , blog-dshr-org-7824 2 6 2018 2018 CD blog-dshr-org-7824 2 7 Securing secure VBG blog-dshr-org-7824 2 8 The the DT blog-dshr-org-7824 2 9 Software Software NNP blog-dshr-org-7824 2 10 Supply supply NN blog-dshr-org-7824 2 11 Chain Chain NNP blog-dshr-org-7824 2 12 This this DT blog-dshr-org-7824 2 13 is be VBZ blog-dshr-org-7824 2 14 the the DT blog-dshr-org-7824 2 15 second second JJ blog-dshr-org-7824 2 16 part part NN blog-dshr-org-7824 2 17 of of IN blog-dshr-org-7824 2 18 a a DT blog-dshr-org-7824 2 19 series series NN blog-dshr-org-7824 2 20 about about IN blog-dshr-org-7824 2 21 trust trust NN blog-dshr-org-7824 2 22 in in IN blog-dshr-org-7824 2 23 digital digital JJ blog-dshr-org-7824 2 24 content content NN blog-dshr-org-7824 2 25 that that WDT blog-dshr-org-7824 2 26 might may MD blog-dshr-org-7824 2 27 be be VB blog-dshr-org-7824 2 28 called call VBN blog-dshr-org-7824 2 29 : : : blog-dshr-org-7824 2 30 Is be VBZ blog-dshr-org-7824 2 31 this this DT blog-dshr-org-7824 2 32 the the DT blog-dshr-org-7824 2 33 real real JJ blog-dshr-org-7824 2 34 life life NN blog-dshr-org-7824 2 35 ? ? . blog-dshr-org-7824 3 1 Is be VBZ blog-dshr-org-7824 3 2 this this DT blog-dshr-org-7824 3 3 just just RB blog-dshr-org-7824 3 4 fantasy fantasy NN blog-dshr-org-7824 3 5 ? ? . blog-dshr-org-7824 4 1 The the DT blog-dshr-org-7824 4 2 first first JJ blog-dshr-org-7824 4 3 part part NN blog-dshr-org-7824 4 4 was be VBD blog-dshr-org-7824 4 5 Certificate Certificate NNP blog-dshr-org-7824 4 6 Transparency Transparency NNP blog-dshr-org-7824 4 7 , , , blog-dshr-org-7824 4 8 about about IN blog-dshr-org-7824 4 9 how how WRB blog-dshr-org-7824 4 10 we -PRON- PRP blog-dshr-org-7824 4 11 know know VBP blog-dshr-org-7824 4 12 we -PRON- PRP blog-dshr-org-7824 4 13 are be VBP blog-dshr-org-7824 4 14 getting get VBG blog-dshr-org-7824 4 15 content content NN blog-dshr-org-7824 4 16 from from IN blog-dshr-org-7824 4 17 the the DT blog-dshr-org-7824 4 18 Web web NN blog-dshr-org-7824 4 19 site site NN blog-dshr-org-7824 4 20 we -PRON- PRP blog-dshr-org-7824 4 21 intended intend VBD blog-dshr-org-7824 4 22 to to IN blog-dshr-org-7824 4 23 . . . blog-dshr-org-7824 5 1 This this DT blog-dshr-org-7824 5 2 part part NN blog-dshr-org-7824 5 3 is be VBZ blog-dshr-org-7824 5 4 about about IN blog-dshr-org-7824 5 5 how how WRB blog-dshr-org-7824 5 6 we -PRON- PRP blog-dshr-org-7824 5 7 know know VBP blog-dshr-org-7824 5 8 we -PRON- PRP blog-dshr-org-7824 5 9 're be VBP blog-dshr-org-7824 5 10 running run VBG blog-dshr-org-7824 5 11 the the DT blog-dshr-org-7824 5 12 software software NN blog-dshr-org-7824 5 13 we -PRON- PRP blog-dshr-org-7824 5 14 intended intend VBD blog-dshr-org-7824 5 15 to to IN blog-dshr-org-7824 5 16 . . . blog-dshr-org-7824 6 1 This this DT blog-dshr-org-7824 6 2 question question NN blog-dshr-org-7824 6 3 , , , blog-dshr-org-7824 6 4 how how WRB blog-dshr-org-7824 6 5 to to TO blog-dshr-org-7824 6 6 defend defend VB blog-dshr-org-7824 6 7 against against IN blog-dshr-org-7824 6 8 software software NN blog-dshr-org-7824 6 9 supply supply NN blog-dshr-org-7824 6 10 chain chain NN blog-dshr-org-7824 6 11 attacks attack NNS blog-dshr-org-7824 6 12 , , , blog-dshr-org-7824 6 13 has have VBZ blog-dshr-org-7824 6 14 been be VBN blog-dshr-org-7824 6 15 in in IN blog-dshr-org-7824 6 16 the the DT blog-dshr-org-7824 6 17 news news NN blog-dshr-org-7824 6 18 recently recently RB blog-dshr-org-7824 6 19 : : : blog-dshr-org-7824 6 20 A a DT blog-dshr-org-7824 6 21 hacker hacker NN blog-dshr-org-7824 6 22 or or CC blog-dshr-org-7824 6 23 hackers hacker NNS blog-dshr-org-7824 6 24 sneaked sneak VBD blog-dshr-org-7824 6 25 a a DT blog-dshr-org-7824 6 26 backdoor backdoor NN blog-dshr-org-7824 6 27 into into IN blog-dshr-org-7824 6 28 a a DT blog-dshr-org-7824 6 29 widely widely RB blog-dshr-org-7824 6 30 used use VBN blog-dshr-org-7824 6 31 open open JJ blog-dshr-org-7824 6 32 source source NN blog-dshr-org-7824 6 33 code code NN blog-dshr-org-7824 6 34 library library NN blog-dshr-org-7824 6 35 with with IN blog-dshr-org-7824 6 36 the the DT blog-dshr-org-7824 6 37 aim aim NN blog-dshr-org-7824 6 38 of of IN blog-dshr-org-7824 6 39 surreptitiously surreptitiously RB blog-dshr-org-7824 6 40 stealing steal VBG blog-dshr-org-7824 6 41 funds fund NNS blog-dshr-org-7824 6 42 stored store VBN blog-dshr-org-7824 6 43 in in IN blog-dshr-org-7824 6 44 bitcoin bitcoin NN blog-dshr-org-7824 6 45 wallets wallet NNS blog-dshr-org-7824 6 46 , , , blog-dshr-org-7824 6 47 software software NN blog-dshr-org-7824 6 48 developers developer NNS blog-dshr-org-7824 6 49 said say VBD blog-dshr-org-7824 6 50 Monday Monday NNP blog-dshr-org-7824 6 51 . . . blog-dshr-org-7824 7 1 The the DT blog-dshr-org-7824 7 2 malicious malicious JJ blog-dshr-org-7824 7 3 code code NN blog-dshr-org-7824 7 4 was be VBD blog-dshr-org-7824 7 5 inserted insert VBN blog-dshr-org-7824 7 6 in in IN blog-dshr-org-7824 7 7 two two CD blog-dshr-org-7824 7 8 stages stage NNS blog-dshr-org-7824 7 9 into into IN blog-dshr-org-7824 7 10 event event NN blog-dshr-org-7824 7 11 - - HYPH blog-dshr-org-7824 7 12 stream stream NN blog-dshr-org-7824 7 13 , , , blog-dshr-org-7824 7 14 a a DT blog-dshr-org-7824 7 15 code code NN blog-dshr-org-7824 7 16 library library NN blog-dshr-org-7824 7 17 with with IN blog-dshr-org-7824 7 18 2 2 CD blog-dshr-org-7824 7 19 million million CD blog-dshr-org-7824 7 20 downloads download NNS blog-dshr-org-7824 7 21 that that WDT blog-dshr-org-7824 7 22 's be VBZ blog-dshr-org-7824 7 23 used use VBN blog-dshr-org-7824 7 24 by by IN blog-dshr-org-7824 7 25 Fortune Fortune NNP blog-dshr-org-7824 7 26 500 500 CD blog-dshr-org-7824 7 27 companies company NNS blog-dshr-org-7824 7 28 and and CC blog-dshr-org-7824 7 29 small small JJ blog-dshr-org-7824 7 30 startups startup NNS blog-dshr-org-7824 7 31 alike alike RB blog-dshr-org-7824 7 32 . . . blog-dshr-org-7824 8 1 In in IN blog-dshr-org-7824 8 2 stage stage NN blog-dshr-org-7824 8 3 one one CD blog-dshr-org-7824 8 4 , , , blog-dshr-org-7824 8 5 version version NN blog-dshr-org-7824 8 6 3.3.6 3.3.6 CD blog-dshr-org-7824 8 7 , , , blog-dshr-org-7824 8 8 published publish VBN blog-dshr-org-7824 8 9 on on IN blog-dshr-org-7824 8 10 September September NNP blog-dshr-org-7824 8 11 8 8 CD blog-dshr-org-7824 8 12 , , , blog-dshr-org-7824 8 13 included include VBD blog-dshr-org-7824 8 14 a a DT blog-dshr-org-7824 8 15 benign benign JJ blog-dshr-org-7824 8 16 module module NN blog-dshr-org-7824 8 17 known know VBN blog-dshr-org-7824 8 18 as as IN blog-dshr-org-7824 8 19 flatmap flatmap NNP blog-dshr-org-7824 8 20 - - HYPH blog-dshr-org-7824 8 21 stream stream NN blog-dshr-org-7824 8 22 . . . blog-dshr-org-7824 9 1 Stage stage NN blog-dshr-org-7824 9 2 two two CD blog-dshr-org-7824 9 3 was be VBD blog-dshr-org-7824 9 4 implemented implement VBN blog-dshr-org-7824 9 5 on on IN blog-dshr-org-7824 9 6 October October NNP blog-dshr-org-7824 9 7 5 5 CD blog-dshr-org-7824 9 8 when when WRB blog-dshr-org-7824 9 9 flatmap flatmap NN blog-dshr-org-7824 9 10 - - HYPH blog-dshr-org-7824 9 11 stream stream NNP blog-dshr-org-7824 9 12 was be VBD blog-dshr-org-7824 9 13 updated update VBN blog-dshr-org-7824 9 14 to to TO blog-dshr-org-7824 9 15 include include VB blog-dshr-org-7824 9 16 malicious malicious JJ blog-dshr-org-7824 9 17 code code NN blog-dshr-org-7824 9 18 that that WDT blog-dshr-org-7824 9 19 attempted attempt VBD blog-dshr-org-7824 9 20 to to TO blog-dshr-org-7824 9 21 steal steal VB blog-dshr-org-7824 9 22 bitcoin bitcoin NN blog-dshr-org-7824 9 23 wallets wallet NNS blog-dshr-org-7824 9 24 and and CC blog-dshr-org-7824 9 25 transfer transfer VB blog-dshr-org-7824 9 26 their -PRON- PRP$ blog-dshr-org-7824 9 27 balances balance NNS blog-dshr-org-7824 9 28 to to IN blog-dshr-org-7824 9 29 a a DT blog-dshr-org-7824 9 30 server server NN blog-dshr-org-7824 9 31 located locate VBN blog-dshr-org-7824 9 32 in in IN blog-dshr-org-7824 9 33 Kuala Kuala NNP blog-dshr-org-7824 9 34 Lumpur Lumpur NNP blog-dshr-org-7824 9 35 . . . blog-dshr-org-7824 10 1 See see VB blog-dshr-org-7824 10 2 also also RB blog-dshr-org-7824 10 3 here here RB blog-dshr-org-7824 10 4 and and CC blog-dshr-org-7824 10 5 here here RB blog-dshr-org-7824 10 6 . . . blog-dshr-org-7824 11 1 The the DT blog-dshr-org-7824 11 2 good good JJ blog-dshr-org-7824 11 3 news news NN blog-dshr-org-7824 11 4 is be VBZ blog-dshr-org-7824 11 5 that that IN blog-dshr-org-7824 11 6 this this DT blog-dshr-org-7824 11 7 was be VBD blog-dshr-org-7824 11 8 a a DT blog-dshr-org-7824 11 9 highly highly RB blog-dshr-org-7824 11 10 specific specific JJ blog-dshr-org-7824 11 11 attack attack NN blog-dshr-org-7824 11 12 against against IN blog-dshr-org-7824 11 13 a a DT blog-dshr-org-7824 11 14 particular particular JJ blog-dshr-org-7824 11 15 kind kind NN blog-dshr-org-7824 11 16 of of IN blog-dshr-org-7824 11 17 cryptocurrency cryptocurrency NN blog-dshr-org-7824 11 18 wallet wallet NN blog-dshr-org-7824 11 19 software software NN blog-dshr-org-7824 11 20 ; ; : blog-dshr-org-7824 11 21 things thing NNS blog-dshr-org-7824 11 22 could could MD blog-dshr-org-7824 11 23 have have VB blog-dshr-org-7824 11 24 been be VBN blog-dshr-org-7824 11 25 much much RB blog-dshr-org-7824 11 26 worse bad JJR blog-dshr-org-7824 11 27 . . . blog-dshr-org-7824 12 1 The the DT blog-dshr-org-7824 12 2 bad bad JJ blog-dshr-org-7824 12 3 news news NN blog-dshr-org-7824 12 4 is be VBZ blog-dshr-org-7824 12 5 that that IN blog-dshr-org-7824 12 6 , , , blog-dshr-org-7824 12 7 however however RB blog-dshr-org-7824 12 8 effective effective JJ blog-dshr-org-7824 12 9 they -PRON- PRP blog-dshr-org-7824 12 10 may may MD blog-dshr-org-7824 12 11 be be VB blog-dshr-org-7824 12 12 against against IN blog-dshr-org-7824 12 13 some some DT blog-dshr-org-7824 12 14 supply supply NN blog-dshr-org-7824 12 15 chain chain NN blog-dshr-org-7824 12 16 attacks attack NNS blog-dshr-org-7824 12 17 , , , blog-dshr-org-7824 12 18 none none NN blog-dshr-org-7824 12 19 of of IN blog-dshr-org-7824 12 20 the the DT blog-dshr-org-7824 12 21 techniques technique NNS blog-dshr-org-7824 12 22 I -PRON- PRP blog-dshr-org-7824 12 23 discuss discuss VBP blog-dshr-org-7824 12 24 below below IN blog-dshr-org-7824 12 25 the the DT blog-dshr-org-7824 12 26 fold fold NN blog-dshr-org-7824 12 27 would would MD blog-dshr-org-7824 12 28 defend defend VB blog-dshr-org-7824 12 29 against against IN blog-dshr-org-7824 12 30 this this DT blog-dshr-org-7824 12 31 particular particular JJ blog-dshr-org-7824 12 32 attack attack NN blog-dshr-org-7824 12 33 . . . blog-dshr-org-7824 13 1 In in IN blog-dshr-org-7824 13 2 an an DT blog-dshr-org-7824 13 3 important important JJ blog-dshr-org-7824 13 4 paper paper NN blog-dshr-org-7824 13 5 entitled entitle VBN blog-dshr-org-7824 13 6 Software Software NNP blog-dshr-org-7824 13 7 Distribution Distribution NNP blog-dshr-org-7824 13 8 Transparency Transparency NNP blog-dshr-org-7824 13 9 and and CC blog-dshr-org-7824 13 10 Auditability Auditability NNP blog-dshr-org-7824 13 11 , , , blog-dshr-org-7824 13 12 Benjamin Benjamin NNP blog-dshr-org-7824 13 13 Hof Hof NNP blog-dshr-org-7824 13 14 and and CC blog-dshr-org-7824 13 15 Georg Georg NNP blog-dshr-org-7824 13 16 Carle Carle NNP blog-dshr-org-7824 13 17 from from IN blog-dshr-org-7824 13 18 TU TU NNP blog-dshr-org-7824 13 19 Munich Munich NNP blog-dshr-org-7824 13 20 use use NN blog-dshr-org-7824 13 21 Debian Debian NNP blog-dshr-org-7824 13 22 's 's POS blog-dshr-org-7824 13 23 Advanced advanced JJ blog-dshr-org-7824 13 24 Package Package NNP blog-dshr-org-7824 13 25 Tool Tool NNP blog-dshr-org-7824 13 26 ( ( -LRB- blog-dshr-org-7824 13 27 APT APT NNP blog-dshr-org-7824 13 28 ) ) -RRB- blog-dshr-org-7824 13 29 as as IN blog-dshr-org-7824 13 30 an an DT blog-dshr-org-7824 13 31 example example NN blog-dshr-org-7824 13 32 of of IN blog-dshr-org-7824 13 33 a a DT blog-dshr-org-7824 13 34 state state NN blog-dshr-org-7824 13 35 - - HYPH blog-dshr-org-7824 13 36 of of IN blog-dshr-org-7824 13 37 - - HYPH blog-dshr-org-7824 13 38 the the DT blog-dshr-org-7824 13 39 - - HYPH blog-dshr-org-7824 13 40 art art NN blog-dshr-org-7824 13 41 software software NN blog-dshr-org-7824 13 42 supply supply NN blog-dshr-org-7824 13 43 chain chain NN blog-dshr-org-7824 13 44 , , , blog-dshr-org-7824 13 45 and and CC blog-dshr-org-7824 13 46 : : : blog-dshr-org-7824 13 47 Describe describe VB blog-dshr-org-7824 13 48 how how WRB blog-dshr-org-7824 13 49 APT apt JJ blog-dshr-org-7824 13 50 works work NNS blog-dshr-org-7824 13 51 to to TO blog-dshr-org-7824 13 52 maintain maintain VB blog-dshr-org-7824 13 53 up up RB blog-dshr-org-7824 13 54 - - HYPH blog-dshr-org-7824 13 55 to to IN blog-dshr-org-7824 13 56 - - HYPH blog-dshr-org-7824 13 57 date date NN blog-dshr-org-7824 13 58 software software NN blog-dshr-org-7824 13 59 on on IN blog-dshr-org-7824 13 60 clients client NNS blog-dshr-org-7824 13 61 by by IN blog-dshr-org-7824 13 62 distributing distribute VBG blog-dshr-org-7824 13 63 signed sign VBN blog-dshr-org-7824 13 64 packages package NNS blog-dshr-org-7824 13 65 . . . blog-dshr-org-7824 14 1 Review review VB blog-dshr-org-7824 14 2 previous previous JJ blog-dshr-org-7824 14 3 efforts effort NNS blog-dshr-org-7824 14 4 to to TO blog-dshr-org-7824 14 5 improve improve VB blog-dshr-org-7824 14 6 the the DT blog-dshr-org-7824 14 7 security security NN blog-dshr-org-7824 14 8 of of IN blog-dshr-org-7824 14 9 this this DT blog-dshr-org-7824 14 10 process process NN blog-dshr-org-7824 14 11 . . . blog-dshr-org-7824 15 1 Propose propose VB blog-dshr-org-7824 15 2 to to TO blog-dshr-org-7824 15 3 enhance enhance VB blog-dshr-org-7824 15 4 APT APT NNP blog-dshr-org-7824 15 5 's 's POS blog-dshr-org-7824 15 6 security security NN blog-dshr-org-7824 15 7 by by IN blog-dshr-org-7824 15 8 layering layer VBG blog-dshr-org-7824 15 9 a a DT blog-dshr-org-7824 15 10 system system NN blog-dshr-org-7824 15 11 similar similar JJ blog-dshr-org-7824 15 12 to to IN blog-dshr-org-7824 15 13 Certificate Certificate NNP blog-dshr-org-7824 15 14 Transparency Transparency NNP blog-dshr-org-7824 15 15 ( ( -LRB- blog-dshr-org-7824 15 16 CT CT NNP blog-dshr-org-7824 15 17 ) ) -RRB- blog-dshr-org-7824 15 18 on on IN blog-dshr-org-7824 15 19 top top NN blog-dshr-org-7824 15 20 . . . blog-dshr-org-7824 16 1 Detail detail VB blog-dshr-org-7824 16 2 the the DT blog-dshr-org-7824 16 3 operation operation NN blog-dshr-org-7824 16 4 of of IN blog-dshr-org-7824 16 5 their -PRON- PRP$ blog-dshr-org-7824 16 6 systems system NNS blog-dshr-org-7824 16 7 ' ' POS blog-dshr-org-7824 16 8 logs log NNS blog-dshr-org-7824 16 9 , , , blog-dshr-org-7824 16 10 auditors auditor NNS blog-dshr-org-7824 16 11 and and CC blog-dshr-org-7824 16 12 monitors monitor NNS blog-dshr-org-7824 16 13 , , , blog-dshr-org-7824 16 14 which which WDT blog-dshr-org-7824 16 15 are be VBP blog-dshr-org-7824 16 16 similar similar JJ blog-dshr-org-7824 16 17 to to IN blog-dshr-org-7824 16 18 CT CT NNP blog-dshr-org-7824 16 19 's 's POS blog-dshr-org-7824 16 20 in in IN blog-dshr-org-7824 16 21 principle principle NN blog-dshr-org-7824 16 22 but but CC blog-dshr-org-7824 16 23 different different JJ blog-dshr-org-7824 16 24 in in IN blog-dshr-org-7824 16 25 detail detail NN blog-dshr-org-7824 16 26 . . . blog-dshr-org-7824 17 1 Describe describe VB blog-dshr-org-7824 17 2 and and CC blog-dshr-org-7824 17 3 measure measure VB blog-dshr-org-7824 17 4 the the DT blog-dshr-org-7824 17 5 performance performance NN blog-dshr-org-7824 17 6 of of IN blog-dshr-org-7824 17 7 an an DT blog-dshr-org-7824 17 8 implementation implementation NN blog-dshr-org-7824 17 9 of of IN blog-dshr-org-7824 17 10 their -PRON- PRP$ blog-dshr-org-7824 17 11 layer layer NN blog-dshr-org-7824 17 12 on on IN blog-dshr-org-7824 17 13 top top NN blog-dshr-org-7824 17 14 of of IN blog-dshr-org-7824 17 15 APT apt NN blog-dshr-org-7824 17 16 using use VBG blog-dshr-org-7824 17 17 the the DT blog-dshr-org-7824 17 18 Trillian trillian JJ blog-dshr-org-7824 17 19 software software NN blog-dshr-org-7824 17 20 underlying underlie VBG blog-dshr-org-7824 17 21 some some DT blog-dshr-org-7824 17 22 CT CT NNP blog-dshr-org-7824 17 23 implementations implementation NNS blog-dshr-org-7824 17 24 . . . blog-dshr-org-7824 18 1 There there EX blog-dshr-org-7824 18 2 are be VBP blog-dshr-org-7824 18 3 two two CD blog-dshr-org-7824 18 4 important important JJ blog-dshr-org-7824 18 5 " " '' blog-dshr-org-7824 18 6 missing miss VBG blog-dshr-org-7824 18 7 pieces piece NNS blog-dshr-org-7824 18 8 " " '' blog-dshr-org-7824 18 9 in in IN blog-dshr-org-7824 18 10 their -PRON- PRP$ blog-dshr-org-7824 18 11 system system NN blog-dshr-org-7824 18 12 , , , blog-dshr-org-7824 18 13 and and CC blog-dshr-org-7824 18 14 all all PDT blog-dshr-org-7824 18 15 the the DT blog-dshr-org-7824 18 16 predecessors predecessor NNS blog-dshr-org-7824 18 17 , , , blog-dshr-org-7824 18 18 which which WDT blog-dshr-org-7824 18 19 are be VBP blog-dshr-org-7824 18 20 the the DT blog-dshr-org-7824 18 21 subjects subject NNS blog-dshr-org-7824 18 22 of of IN blog-dshr-org-7824 18 23 separate separate JJ blog-dshr-org-7824 18 24 efforts effort NNS blog-dshr-org-7824 18 25 : : : blog-dshr-org-7824 18 26 Reproducible Reproducible NNP blog-dshr-org-7824 18 27 Builds Builds NNPS blog-dshr-org-7824 18 28 . . . blog-dshr-org-7824 19 1 Bootstrappable Bootstrappable NNP blog-dshr-org-7824 19 2 Compilers Compilers NNPS blog-dshr-org-7824 19 3 . . . blog-dshr-org-7824 20 1 How how WRB blog-dshr-org-7824 20 2 APT apt JJ blog-dshr-org-7824 20 3 Works work VBZ blog-dshr-org-7824 20 4 A a DT blog-dshr-org-7824 20 5 system system NN blog-dshr-org-7824 20 6 running run VBG blog-dshr-org-7824 20 7 Debian debian JJ blog-dshr-org-7824 20 8 or or CC blog-dshr-org-7824 20 9 other other JJ blog-dshr-org-7824 20 10 APT apt NN blog-dshr-org-7824 20 11 - - HYPH blog-dshr-org-7824 20 12 based base VBN blog-dshr-org-7824 20 13 Linux Linux NNP blog-dshr-org-7824 20 14 distribution distribution NN blog-dshr-org-7824 20 15 runs run VBZ blog-dshr-org-7824 20 16 software software NN blog-dshr-org-7824 20 17 it -PRON- PRP blog-dshr-org-7824 20 18 received receive VBD blog-dshr-org-7824 20 19 in in IN blog-dshr-org-7824 20 20 " " `` blog-dshr-org-7824 20 21 packages package NNS blog-dshr-org-7824 20 22 " " '' blog-dshr-org-7824 20 23 that that WDT blog-dshr-org-7824 20 24 contain contain VBP blog-dshr-org-7824 20 25 the the DT blog-dshr-org-7824 20 26 software software NN blog-dshr-org-7824 20 27 files file NNS blog-dshr-org-7824 20 28 , , , blog-dshr-org-7824 20 29 and and CC blog-dshr-org-7824 20 30 metadata metadata NN blog-dshr-org-7824 20 31 that that WDT blog-dshr-org-7824 20 32 includes include VBZ blog-dshr-org-7824 20 33 dependencies dependency NNS blog-dshr-org-7824 20 34 . . . blog-dshr-org-7824 21 1 Their -PRON- PRP$ blog-dshr-org-7824 21 2 hashes hash NNS blog-dshr-org-7824 21 3 can can MD blog-dshr-org-7824 21 4 be be VB blog-dshr-org-7824 21 5 verified verify VBN blog-dshr-org-7824 21 6 against against IN blog-dshr-org-7824 21 7 those those DT blog-dshr-org-7824 21 8 in in IN blog-dshr-org-7824 21 9 a a DT blog-dshr-org-7824 21 10 release release NN blog-dshr-org-7824 21 11 file file NN blog-dshr-org-7824 21 12 , , , blog-dshr-org-7824 21 13 signed sign VBN blog-dshr-org-7824 21 14 by by IN blog-dshr-org-7824 21 15 the the DT blog-dshr-org-7824 21 16 distribution distribution NN blog-dshr-org-7824 21 17 publisher publisher NN blog-dshr-org-7824 21 18 . . . blog-dshr-org-7824 22 1 Packages package NNS blog-dshr-org-7824 22 2 come come VBP blog-dshr-org-7824 22 3 in in IN blog-dshr-org-7824 22 4 two two CD blog-dshr-org-7824 22 5 forms form NNS blog-dshr-org-7824 22 6 , , , blog-dshr-org-7824 22 7 source source NN blog-dshr-org-7824 22 8 and and CC blog-dshr-org-7824 22 9 compiled compile VBD blog-dshr-org-7824 22 10 . . . blog-dshr-org-7824 23 1 The the DT blog-dshr-org-7824 23 2 source source NN blog-dshr-org-7824 23 3 of of IN blog-dshr-org-7824 23 4 a a DT blog-dshr-org-7824 23 5 package package NN blog-dshr-org-7824 23 6 is be VBZ blog-dshr-org-7824 23 7 signed sign VBN blog-dshr-org-7824 23 8 by by IN blog-dshr-org-7824 23 9 the the DT blog-dshr-org-7824 23 10 official official JJ blog-dshr-org-7824 23 11 package package NN blog-dshr-org-7824 23 12 maintainer maintainer NN blog-dshr-org-7824 23 13 and and CC blog-dshr-org-7824 23 14 submitted submit VBN blog-dshr-org-7824 23 15 to to IN blog-dshr-org-7824 23 16 the the DT blog-dshr-org-7824 23 17 distribution distribution NN blog-dshr-org-7824 23 18 publisher publisher NN blog-dshr-org-7824 23 19 . . . blog-dshr-org-7824 24 1 The the DT blog-dshr-org-7824 24 2 publisher publisher NN blog-dshr-org-7824 24 3 verifies verify VBZ blog-dshr-org-7824 24 4 the the DT blog-dshr-org-7824 24 5 signature signature NN blog-dshr-org-7824 24 6 and and CC blog-dshr-org-7824 24 7 builds build VBZ blog-dshr-org-7824 24 8 the the DT blog-dshr-org-7824 24 9 source source NN blog-dshr-org-7824 24 10 to to TO blog-dshr-org-7824 24 11 form form VB blog-dshr-org-7824 24 12 the the DT blog-dshr-org-7824 24 13 compiled compile VBN blog-dshr-org-7824 24 14 package package NN blog-dshr-org-7824 24 15 , , , blog-dshr-org-7824 24 16 whose whose WP$ blog-dshr-org-7824 24 17 hash hash NN blog-dshr-org-7824 24 18 is be VBZ blog-dshr-org-7824 24 19 then then RB blog-dshr-org-7824 24 20 included include VBN blog-dshr-org-7824 24 21 in in IN blog-dshr-org-7824 24 22 the the DT blog-dshr-org-7824 24 23 release release NN blog-dshr-org-7824 24 24 file file NN blog-dshr-org-7824 24 25 . . . blog-dshr-org-7824 25 1 The the DT blog-dshr-org-7824 25 2 signature signature NN blog-dshr-org-7824 25 3 on on IN blog-dshr-org-7824 25 4 the the DT blog-dshr-org-7824 25 5 source source NN blog-dshr-org-7824 25 6 package package NN blog-dshr-org-7824 25 7 verifies verifie NNS blog-dshr-org-7824 25 8 that that IN blog-dshr-org-7824 25 9 the the DT blog-dshr-org-7824 25 10 package package NN blog-dshr-org-7824 25 11 maintainer maintainer NN blog-dshr-org-7824 25 12 approves approve VBZ blog-dshr-org-7824 25 13 this this DT blog-dshr-org-7824 25 14 combination combination NN blog-dshr-org-7824 25 15 of of IN blog-dshr-org-7824 25 16 files file NNS blog-dshr-org-7824 25 17 for for IN blog-dshr-org-7824 25 18 the the DT blog-dshr-org-7824 25 19 distributor distributor NN blog-dshr-org-7824 25 20 to to TO blog-dshr-org-7824 25 21 build build VB blog-dshr-org-7824 25 22 . . . blog-dshr-org-7824 26 1 The the DT blog-dshr-org-7824 26 2 signature signature NN blog-dshr-org-7824 26 3 on on IN blog-dshr-org-7824 26 4 the the DT blog-dshr-org-7824 26 5 release release NN blog-dshr-org-7824 26 6 file file NN blog-dshr-org-7824 26 7 verifies verifie NNS blog-dshr-org-7824 26 8 that that IN blog-dshr-org-7824 26 9 the the DT blog-dshr-org-7824 26 10 distributor distributor NN blog-dshr-org-7824 26 11 built build VBD blog-dshr-org-7824 26 12 the the DT blog-dshr-org-7824 26 13 corresponding correspond VBG blog-dshr-org-7824 26 14 set set NN blog-dshr-org-7824 26 15 of of IN blog-dshr-org-7824 26 16 packages package NNS blog-dshr-org-7824 26 17 from from IN blog-dshr-org-7824 26 18 approved approve VBN blog-dshr-org-7824 26 19 sources source NNS blog-dshr-org-7824 26 20 and and CC blog-dshr-org-7824 26 21 that that IN blog-dshr-org-7824 26 22 the the DT blog-dshr-org-7824 26 23 combination combination NN blog-dshr-org-7824 26 24 is be VBZ blog-dshr-org-7824 26 25 approved approve VBN blog-dshr-org-7824 26 26 for for IN blog-dshr-org-7824 26 27 users user NNS blog-dshr-org-7824 26 28 to to TO blog-dshr-org-7824 26 29 install install VB blog-dshr-org-7824 26 30 . . . blog-dshr-org-7824 27 1 Previous previous JJ blog-dshr-org-7824 27 2 Work work NN blog-dshr-org-7824 27 3 It -PRON- PRP blog-dshr-org-7824 27 4 is be VBZ blog-dshr-org-7824 27 5 , , , blog-dshr-org-7824 27 6 of of IN blog-dshr-org-7824 27 7 course course NN blog-dshr-org-7824 27 8 , , , blog-dshr-org-7824 27 9 possible possible JJ blog-dshr-org-7824 27 10 for for IN blog-dshr-org-7824 27 11 the the DT blog-dshr-org-7824 27 12 private private JJ blog-dshr-org-7824 27 13 keys key NNS blog-dshr-org-7824 27 14 on on IN blog-dshr-org-7824 27 15 which which WDT blog-dshr-org-7824 27 16 the the DT blog-dshr-org-7824 27 17 maintainer maintainer NN blog-dshr-org-7824 27 18 's 's POS blog-dshr-org-7824 27 19 and and CC blog-dshr-org-7824 27 20 distributor distributor NNP blog-dshr-org-7824 27 21 's 's POS blog-dshr-org-7824 27 22 signatures signature NNS blog-dshr-org-7824 27 23 depend depend VBP blog-dshr-org-7824 27 24 to to TO blog-dshr-org-7824 27 25 be be VB blog-dshr-org-7824 27 26 compromised compromise VBN blog-dshr-org-7824 27 27 : : : blog-dshr-org-7824 27 28 Samuel Samuel NNP blog-dshr-org-7824 27 29 et et NNP blog-dshr-org-7824 27 30 al al NNP blog-dshr-org-7824 27 31 . . . blog-dshr-org-7824 28 1 consider consider VB blog-dshr-org-7824 28 2 compromise compromise NN blog-dshr-org-7824 28 3 of of IN blog-dshr-org-7824 28 4 signing sign VBG blog-dshr-org-7824 28 5 keys key NNS blog-dshr-org-7824 28 6 in in IN blog-dshr-org-7824 28 7 the the DT blog-dshr-org-7824 28 8 design design NN blog-dshr-org-7824 28 9 of of IN blog-dshr-org-7824 28 10 The the DT blog-dshr-org-7824 28 11 Update Update NNP blog-dshr-org-7824 28 12 Framework Framework NNP blog-dshr-org-7824 28 13 ( ( -LRB- blog-dshr-org-7824 28 14 TUF TUF NNP blog-dshr-org-7824 28 15 ) ) -RRB- blog-dshr-org-7824 28 16 , , , blog-dshr-org-7824 28 17 a a DT blog-dshr-org-7824 28 18 secure secure JJ blog-dshr-org-7824 28 19 application application NN blog-dshr-org-7824 28 20 updater updater NN blog-dshr-org-7824 28 21 . . . blog-dshr-org-7824 29 1 To to TO blog-dshr-org-7824 29 2 guard guard VB blog-dshr-org-7824 29 3 against against IN blog-dshr-org-7824 29 4 key key JJ blog-dshr-org-7824 29 5 compromise compromise NN blog-dshr-org-7824 29 6 , , , blog-dshr-org-7824 29 7 TUF TUF NNP blog-dshr-org-7824 29 8 introduces introduce VBZ blog-dshr-org-7824 29 9 a a DT blog-dshr-org-7824 29 10 number number NN blog-dshr-org-7824 29 11 of of IN blog-dshr-org-7824 29 12 different different JJ blog-dshr-org-7824 29 13 roles role NNS blog-dshr-org-7824 29 14 in in IN blog-dshr-org-7824 29 15 the the DT blog-dshr-org-7824 29 16 update update NN blog-dshr-org-7824 29 17 release release NN blog-dshr-org-7824 29 18 process process NN blog-dshr-org-7824 29 19 , , , blog-dshr-org-7824 29 20 each each DT blog-dshr-org-7824 29 21 of of IN blog-dshr-org-7824 29 22 which which WDT blog-dshr-org-7824 29 23 operates operate VBZ blog-dshr-org-7824 29 24 cryptographic cryptographic JJ blog-dshr-org-7824 29 25 signing signing NN blog-dshr-org-7824 29 26 keys key NNS blog-dshr-org-7824 29 27 . . . blog-dshr-org-7824 30 1 The the DT blog-dshr-org-7824 30 2 following follow VBG blog-dshr-org-7824 30 3 three three CD blog-dshr-org-7824 30 4 properties property NNS blog-dshr-org-7824 30 5 are be VBP blog-dshr-org-7824 30 6 protected protect VBN blog-dshr-org-7824 30 7 by by IN blog-dshr-org-7824 30 8 TUF TUF NNP blog-dshr-org-7824 30 9 . . . blog-dshr-org-7824 31 1 The the DT blog-dshr-org-7824 31 2 content content NN blog-dshr-org-7824 31 3 of of IN blog-dshr-org-7824 31 4 updates update NNS blog-dshr-org-7824 31 5 is be VBZ blog-dshr-org-7824 31 6 secured secure VBN blog-dshr-org-7824 31 7 , , , blog-dshr-org-7824 31 8 meaning mean VBG blog-dshr-org-7824 31 9 its -PRON- PRP$ blog-dshr-org-7824 31 10 integrity integrity NN blog-dshr-org-7824 31 11 is be VBZ blog-dshr-org-7824 31 12 preserved preserve VBN blog-dshr-org-7824 31 13 . . . blog-dshr-org-7824 32 1 Securing secure VBG blog-dshr-org-7824 32 2 the the DT blog-dshr-org-7824 32 3 availability availability NN blog-dshr-org-7824 32 4 of of IN blog-dshr-org-7824 32 5 updates update NNS blog-dshr-org-7824 32 6 protects protect NNS blog-dshr-org-7824 32 7 against against IN blog-dshr-org-7824 32 8 freeze freeze NN blog-dshr-org-7824 32 9 attacks attack NNS blog-dshr-org-7824 32 10 , , , blog-dshr-org-7824 32 11 where where WRB blog-dshr-org-7824 32 12 an an DT blog-dshr-org-7824 32 13 outdated outdated JJ blog-dshr-org-7824 32 14 version version NN blog-dshr-org-7824 32 15 with with IN blog-dshr-org-7824 32 16 known know VBN blog-dshr-org-7824 32 17 vulnerabilities vulnerability NNS blog-dshr-org-7824 32 18 is be VBZ blog-dshr-org-7824 32 19 served serve VBN blog-dshr-org-7824 32 20 in in IN blog-dshr-org-7824 32 21 place place NN blog-dshr-org-7824 32 22 of of IN blog-dshr-org-7824 32 23 a a DT blog-dshr-org-7824 32 24 security security NN blog-dshr-org-7824 32 25 update update NN blog-dshr-org-7824 32 26 . . . blog-dshr-org-7824 33 1 The the DT blog-dshr-org-7824 33 2 goal goal NN blog-dshr-org-7824 33 3 of of IN blog-dshr-org-7824 33 4 maintaining maintain VBG blog-dshr-org-7824 33 5 the the DT blog-dshr-org-7824 33 6 correct correct JJ blog-dshr-org-7824 33 7 combination combination NN blog-dshr-org-7824 33 8 of of IN blog-dshr-org-7824 33 9 updates update NNS blog-dshr-org-7824 33 10 implies imply VBZ blog-dshr-org-7824 33 11 the the DT blog-dshr-org-7824 33 12 security security NN blog-dshr-org-7824 33 13 of of IN blog-dshr-org-7824 33 14 meta meta JJ blog-dshr-org-7824 33 15 data datum NNS blog-dshr-org-7824 33 16 . . . blog-dshr-org-7824 34 1 The the DT blog-dshr-org-7824 34 2 goal goal NN blog-dshr-org-7824 34 3 of of IN blog-dshr-org-7824 34 4 introducing introduce VBG blog-dshr-org-7824 34 5 multiple multiple JJ blog-dshr-org-7824 34 6 roles role NNS blog-dshr-org-7824 34 7 each each DT blog-dshr-org-7824 34 8 with with IN blog-dshr-org-7824 34 9 its -PRON- PRP$ blog-dshr-org-7824 34 10 own own JJ blog-dshr-org-7824 34 11 key key NN blog-dshr-org-7824 34 12 is be VBZ blog-dshr-org-7824 34 13 to to TO blog-dshr-org-7824 34 14 limit limit VB blog-dshr-org-7824 34 15 the the DT blog-dshr-org-7824 34 16 damage damage NN blog-dshr-org-7824 34 17 a a DT blog-dshr-org-7824 34 18 single single JJ blog-dshr-org-7824 34 19 compromised compromise VBN blog-dshr-org-7824 34 20 key key NN blog-dshr-org-7824 34 21 can can MD blog-dshr-org-7824 34 22 do do VB blog-dshr-org-7824 34 23 . . . blog-dshr-org-7824 35 1 An an DT blog-dshr-org-7824 35 2 orthogonal orthogonal JJ blog-dshr-org-7824 35 3 approach approach NN blog-dshr-org-7824 35 4 is be VBZ blog-dshr-org-7824 35 5 to to TO blog-dshr-org-7824 35 6 implement implement VB blog-dshr-org-7824 35 7 multiple multiple JJ blog-dshr-org-7824 35 8 keys key NNS blog-dshr-org-7824 35 9 for for IN blog-dshr-org-7824 35 10 each each DT blog-dshr-org-7824 35 11 role role NN blog-dshr-org-7824 35 12 , , , blog-dshr-org-7824 35 13 with with IN blog-dshr-org-7824 35 14 users user NNS blog-dshr-org-7824 35 15 requiring require VBG blog-dshr-org-7824 35 16 a a DT blog-dshr-org-7824 35 17 quorum quorum NN blog-dshr-org-7824 35 18 of of IN blog-dshr-org-7824 35 19 verified verified JJ blog-dshr-org-7824 35 20 signatures signature NNS blog-dshr-org-7824 35 21 before before IN blog-dshr-org-7824 35 22 accepting accept VBG blog-dshr-org-7824 35 23 a a DT blog-dshr-org-7824 35 24 package package NN blog-dshr-org-7824 35 25 : : : blog-dshr-org-7824 35 26 Nikitin Nikitin NNP blog-dshr-org-7824 35 27 et et NNP blog-dshr-org-7824 35 28 al al NNP blog-dshr-org-7824 35 29 . . . blog-dshr-org-7824 36 1 develop develop VB blog-dshr-org-7824 36 2 CHAINIAC CHAINIAC NNP blog-dshr-org-7824 36 3 , , , blog-dshr-org-7824 36 4 a a DT blog-dshr-org-7824 36 5 system system NN blog-dshr-org-7824 36 6 for for IN blog-dshr-org-7824 36 7 software software NN blog-dshr-org-7824 36 8 update update NN blog-dshr-org-7824 36 9 transparency transparency NN blog-dshr-org-7824 36 10 . . . blog-dshr-org-7824 37 1 Software software NN blog-dshr-org-7824 37 2 developers developer NNS blog-dshr-org-7824 37 3 create create VBP blog-dshr-org-7824 37 4 a a DT blog-dshr-org-7824 37 5 Merkle Merkle NNP blog-dshr-org-7824 37 6 tree tree NN blog-dshr-org-7824 37 7 over over IN blog-dshr-org-7824 37 8 a a DT blog-dshr-org-7824 37 9 software software NN blog-dshr-org-7824 37 10 package package NN blog-dshr-org-7824 37 11 and and CC blog-dshr-org-7824 37 12 the the DT blog-dshr-org-7824 37 13 corresponding correspond VBG blog-dshr-org-7824 37 14 binaries binary NNS blog-dshr-org-7824 37 15 . . . blog-dshr-org-7824 38 1 This this DT blog-dshr-org-7824 38 2 tree tree NN blog-dshr-org-7824 38 3 is be VBZ blog-dshr-org-7824 38 4 then then RB blog-dshr-org-7824 38 5 signed sign VBN blog-dshr-org-7824 38 6 by by IN blog-dshr-org-7824 38 7 the the DT blog-dshr-org-7824 38 8 developer developer NN blog-dshr-org-7824 38 9 , , , blog-dshr-org-7824 38 10 constituting constitute VBG blog-dshr-org-7824 38 11 release release NN blog-dshr-org-7824 38 12 approval approval NN blog-dshr-org-7824 38 13 . . . blog-dshr-org-7824 39 1 The the DT blog-dshr-org-7824 39 2 signed sign VBN blog-dshr-org-7824 39 3 trees tree NNS blog-dshr-org-7824 39 4 are be VBP blog-dshr-org-7824 39 5 submitted submit VBN blog-dshr-org-7824 39 6 to to TO blog-dshr-org-7824 39 7 co co VB blog-dshr-org-7824 39 8 - - JJ blog-dshr-org-7824 39 9 signing signing JJ blog-dshr-org-7824 39 10 witness witness NN blog-dshr-org-7824 39 11 servers server NNS blog-dshr-org-7824 39 12 . . . blog-dshr-org-7824 40 1 The the DT blog-dshr-org-7824 40 2 witnesses witness NNS blog-dshr-org-7824 40 3 require require VBP blog-dshr-org-7824 40 4 a a DT blog-dshr-org-7824 40 5 threshold threshold NN blog-dshr-org-7824 40 6 of of IN blog-dshr-org-7824 40 7 valid valid JJ blog-dshr-org-7824 40 8 developer developer NN blog-dshr-org-7824 40 9 signatures signature NNS blog-dshr-org-7824 40 10 to to TO blog-dshr-org-7824 40 11 accept accept VB blog-dshr-org-7824 40 12 a a DT blog-dshr-org-7824 40 13 package package NN blog-dshr-org-7824 40 14 for for IN blog-dshr-org-7824 40 15 release release NN blog-dshr-org-7824 40 16 . . . blog-dshr-org-7824 41 1 Additionally additionally RB blog-dshr-org-7824 41 2 , , , blog-dshr-org-7824 41 3 the the DT blog-dshr-org-7824 41 4 mapping mapping NN blog-dshr-org-7824 41 5 between between IN blog-dshr-org-7824 41 6 source source NN blog-dshr-org-7824 41 7 and and CC blog-dshr-org-7824 41 8 binary binary NN blog-dshr-org-7824 41 9 is be VBZ blog-dshr-org-7824 41 10 verified verify VBN blog-dshr-org-7824 41 11 by by IN blog-dshr-org-7824 41 12 some some DT blog-dshr-org-7824 41 13 of of IN blog-dshr-org-7824 41 14 the the DT blog-dshr-org-7824 41 15 witnesses witness NNS blog-dshr-org-7824 41 16 . . . blog-dshr-org-7824 42 1 If if IN blog-dshr-org-7824 42 2 these these DT blog-dshr-org-7824 42 3 two two CD blog-dshr-org-7824 42 4 checks check NNS blog-dshr-org-7824 42 5 succeed succeed VBP blog-dshr-org-7824 42 6 , , , blog-dshr-org-7824 42 7 the the DT blog-dshr-org-7824 42 8 release release NN blog-dshr-org-7824 42 9 is be VBZ blog-dshr-org-7824 42 10 accepted accept VBN blog-dshr-org-7824 42 11 and and CC blog-dshr-org-7824 42 12 collectively collectively RB blog-dshr-org-7824 42 13 signed sign VBN blog-dshr-org-7824 42 14 by by IN blog-dshr-org-7824 42 15 the the DT blog-dshr-org-7824 42 16 witnesses witness NNS blog-dshr-org-7824 42 17 . . . blog-dshr-org-7824 43 1 The the DT blog-dshr-org-7824 43 2 system system NN blog-dshr-org-7824 43 3 allows allow VBZ blog-dshr-org-7824 43 4 to to TO blog-dshr-org-7824 43 5 rotate rotate VB blog-dshr-org-7824 43 6 developer developer NN blog-dshr-org-7824 43 7 keys key NNS blog-dshr-org-7824 43 8 and and CC blog-dshr-org-7824 43 9 witness witness NN blog-dshr-org-7824 43 10 keys key NNS blog-dshr-org-7824 43 11 , , , blog-dshr-org-7824 43 12 while while IN blog-dshr-org-7824 43 13 the the DT blog-dshr-org-7824 43 14 root root NN blog-dshr-org-7824 43 15 of of IN blog-dshr-org-7824 43 16 trust trust NN blog-dshr-org-7824 43 17 is be VBZ blog-dshr-org-7824 43 18 an an DT blog-dshr-org-7824 43 19 offline offline JJ blog-dshr-org-7824 43 20 key key NN blog-dshr-org-7824 43 21 . . . blog-dshr-org-7824 44 1 It -PRON- PRP blog-dshr-org-7824 44 2 also also RB blog-dshr-org-7824 44 3 functions function VBZ blog-dshr-org-7824 44 4 as as IN blog-dshr-org-7824 44 5 a a DT blog-dshr-org-7824 44 6 timestamping timestamping NN blog-dshr-org-7824 44 7 service service NN blog-dshr-org-7824 44 8 , , , blog-dshr-org-7824 44 9 allowing allow VBG blog-dshr-org-7824 44 10 for for IN blog-dshr-org-7824 44 11 verification verification NN blog-dshr-org-7824 44 12 of of IN blog-dshr-org-7824 44 13 update update NN blog-dshr-org-7824 44 14 timeliness timeliness NN blog-dshr-org-7824 44 15 . . . blog-dshr-org-7824 45 1 CT CT NNP blog-dshr-org-7824 45 2 - - HYPH blog-dshr-org-7824 45 3 like like NNP blog-dshr-org-7824 45 4 Layer Layer NNP blog-dshr-org-7824 45 5 Hof Hof NNP blog-dshr-org-7824 45 6 and and CC blog-dshr-org-7824 45 7 Carle Carle NNP blog-dshr-org-7824 45 8 's 's POS blog-dshr-org-7824 45 9 proposal proposal NN blog-dshr-org-7824 45 10 is be VBZ blog-dshr-org-7824 45 11 to to TO blog-dshr-org-7824 45 12 use use VB blog-dshr-org-7824 45 13 verifiable verifiable JJ blog-dshr-org-7824 45 14 logs log NNS blog-dshr-org-7824 45 15 , , , blog-dshr-org-7824 45 16 similar similar JJ blog-dshr-org-7824 45 17 to to IN blog-dshr-org-7824 45 18 those those DT blog-dshr-org-7824 45 19 in in IN blog-dshr-org-7824 45 20 CT CT NNP blog-dshr-org-7824 45 21 , , , blog-dshr-org-7824 45 22 to to TO blog-dshr-org-7824 45 23 ensure ensure VB blog-dshr-org-7824 45 24 that that IN blog-dshr-org-7824 45 25 malfeasance malfeasance NN blog-dshr-org-7824 45 26 is be VBZ blog-dshr-org-7824 45 27 detectable detectable JJ blog-dshr-org-7824 45 28 . . . blog-dshr-org-7824 46 1 They -PRON- PRP blog-dshr-org-7824 46 2 write write VBP blog-dshr-org-7824 46 3 : : : blog-dshr-org-7824 46 4 Compromise compromise NN blog-dshr-org-7824 46 5 of of IN blog-dshr-org-7824 46 6 components component NNS blog-dshr-org-7824 46 7 and and CC blog-dshr-org-7824 46 8 collusion collusion NN blog-dshr-org-7824 46 9 of of IN blog-dshr-org-7824 46 10 participants participant NNS blog-dshr-org-7824 46 11 must must MD blog-dshr-org-7824 46 12 not not RB blog-dshr-org-7824 46 13 result result VB blog-dshr-org-7824 46 14 in in IN blog-dshr-org-7824 46 15 a a DT blog-dshr-org-7824 46 16 violation violation NN blog-dshr-org-7824 46 17 of of IN blog-dshr-org-7824 46 18 the the DT blog-dshr-org-7824 46 19 following follow VBG blog-dshr-org-7824 46 20 security security NN blog-dshr-org-7824 46 21 goals goal NNS blog-dshr-org-7824 46 22 remaining remain VBG blog-dshr-org-7824 46 23 undetected undetected JJ blog-dshr-org-7824 46 24 . . . blog-dshr-org-7824 47 1 A a DT blog-dshr-org-7824 47 2 goal goal NN blog-dshr-org-7824 47 3 of of IN blog-dshr-org-7824 47 4 our -PRON- PRP$ blog-dshr-org-7824 47 5 system system NN blog-dshr-org-7824 47 6 is be VBZ blog-dshr-org-7824 47 7 to to TO blog-dshr-org-7824 47 8 make make VB blog-dshr-org-7824 47 9 it -PRON- PRP blog-dshr-org-7824 47 10 infeasible infeasible JJ blog-dshr-org-7824 47 11 for for IN blog-dshr-org-7824 47 12 the the DT blog-dshr-org-7824 47 13 attacker attacker NN blog-dshr-org-7824 47 14 to to TO blog-dshr-org-7824 47 15 deliver deliver VB blog-dshr-org-7824 47 16 targeted target VBN blog-dshr-org-7824 47 17 backdoors backdoor NNS blog-dshr-org-7824 47 18 . . . blog-dshr-org-7824 48 1 For for IN blog-dshr-org-7824 48 2 every every DT blog-dshr-org-7824 48 3 binary binary NN blog-dshr-org-7824 48 4 , , , blog-dshr-org-7824 48 5 the the DT blog-dshr-org-7824 48 6 system system NN blog-dshr-org-7824 48 7 can can MD blog-dshr-org-7824 48 8 produce produce VB blog-dshr-org-7824 48 9 the the DT blog-dshr-org-7824 48 10 corresponding corresponding JJ blog-dshr-org-7824 48 11 source source NN blog-dshr-org-7824 48 12 code code NN blog-dshr-org-7824 48 13 and and CC blog-dshr-org-7824 48 14 the the DT blog-dshr-org-7824 48 15 authorizing authorize VBG blog-dshr-org-7824 48 16 maintainer maintainer NN blog-dshr-org-7824 48 17 . . . blog-dshr-org-7824 49 1 Defined define VBN blog-dshr-org-7824 49 2 irregularities irregularity NNS blog-dshr-org-7824 49 3 , , , blog-dshr-org-7824 49 4 such such JJ blog-dshr-org-7824 49 5 as as IN blog-dshr-org-7824 49 6 a a DT blog-dshr-org-7824 49 7 failure failure NN blog-dshr-org-7824 49 8 to to TO blog-dshr-org-7824 49 9 correctly correctly RB blog-dshr-org-7824 49 10 increment increment VB blog-dshr-org-7824 49 11 version version NN blog-dshr-org-7824 49 12 numbers number NNS blog-dshr-org-7824 49 13 , , , blog-dshr-org-7824 49 14 also also RB blog-dshr-org-7824 49 15 can can MD blog-dshr-org-7824 49 16 be be VB blog-dshr-org-7824 49 17 detected detect VBN blog-dshr-org-7824 49 18 by by IN blog-dshr-org-7824 49 19 the the DT blog-dshr-org-7824 49 20 system system NN blog-dshr-org-7824 49 21 . . . blog-dshr-org-7824 50 1 As as IN blog-dshr-org-7824 50 2 I -PRON- PRP blog-dshr-org-7824 50 3 understand understand VBP blog-dshr-org-7824 50 4 it -PRON- PRP blog-dshr-org-7824 50 5 , , , blog-dshr-org-7824 50 6 this this DT blog-dshr-org-7824 50 7 is be VBZ blog-dshr-org-7824 50 8 accurate accurate JJ blog-dshr-org-7824 50 9 but but CC blog-dshr-org-7824 50 10 somewhat somewhat RB blog-dshr-org-7824 50 11 misleading misleading JJ blog-dshr-org-7824 50 12 . . . blog-dshr-org-7824 51 1 Their -PRON- PRP$ blog-dshr-org-7824 51 2 system system NN blog-dshr-org-7824 51 3 adds add VBZ blog-dshr-org-7824 51 4 a a DT blog-dshr-org-7824 51 5 transparency transparency NN blog-dshr-org-7824 51 6 layer layer NN blog-dshr-org-7824 51 7 on on IN blog-dshr-org-7824 51 8 top top NN blog-dshr-org-7824 51 9 of of IN blog-dshr-org-7824 51 10 APT apt NN blog-dshr-org-7824 51 11 : : : blog-dshr-org-7824 51 12 The the DT blog-dshr-org-7824 51 13 APT APT NNP blog-dshr-org-7824 51 14 release release NN blog-dshr-org-7824 51 15 file file NN blog-dshr-org-7824 51 16 identifies identifie NNS blog-dshr-org-7824 51 17 , , , blog-dshr-org-7824 51 18 by by IN blog-dshr-org-7824 51 19 cryptographic cryptographic JJ blog-dshr-org-7824 51 20 hash hash NN blog-dshr-org-7824 51 21 , , , blog-dshr-org-7824 51 22 the the DT blog-dshr-org-7824 51 23 packages package NNS blog-dshr-org-7824 51 24 , , , blog-dshr-org-7824 51 25 sources source NNS blog-dshr-org-7824 51 26 , , , blog-dshr-org-7824 51 27 and and CC blog-dshr-org-7824 51 28 meta meta JJ blog-dshr-org-7824 51 29 data datum NNS blog-dshr-org-7824 51 30 which which WDT blog-dshr-org-7824 51 31 includes include VBZ blog-dshr-org-7824 51 32 dependencies dependency NNS blog-dshr-org-7824 51 33 . . . blog-dshr-org-7824 52 1 This this DT blog-dshr-org-7824 52 2 release release NN blog-dshr-org-7824 52 3 file file NN blog-dshr-org-7824 52 4 , , , blog-dshr-org-7824 52 5 meta meta JJ blog-dshr-org-7824 52 6 data datum NNS blog-dshr-org-7824 52 7 , , , blog-dshr-org-7824 52 8 and and CC blog-dshr-org-7824 52 9 source source NN blog-dshr-org-7824 52 10 packages package NNS blog-dshr-org-7824 52 11 are be VBP blog-dshr-org-7824 52 12 submitted submit VBN blog-dshr-org-7824 52 13 to to IN blog-dshr-org-7824 52 14 a a DT blog-dshr-org-7824 52 15 log log NN blog-dshr-org-7824 52 16 server server NN blog-dshr-org-7824 52 17 operating operate VBG blog-dshr-org-7824 52 18 an an DT blog-dshr-org-7824 52 19 appendonly appendonly JJ blog-dshr-org-7824 52 20 Merkle Merkle NNP blog-dshr-org-7824 52 21 tree tree NN blog-dshr-org-7824 52 22 , , , blog-dshr-org-7824 52 23 as as IN blog-dshr-org-7824 52 24 shown show VBN blog-dshr-org-7824 52 25 in in IN blog-dshr-org-7824 52 26 Figure Figure NNP blog-dshr-org-7824 52 27 2 2 CD blog-dshr-org-7824 52 28 . . . blog-dshr-org-7824 53 1 The the DT blog-dshr-org-7824 53 2 log log NN blog-dshr-org-7824 53 3 adds add VBZ blog-dshr-org-7824 53 4 a a DT blog-dshr-org-7824 53 5 new new JJ blog-dshr-org-7824 53 6 leaf leaf NN blog-dshr-org-7824 53 7 for for IN blog-dshr-org-7824 53 8 each each DT blog-dshr-org-7824 53 9 file file NN blog-dshr-org-7824 53 10 . . . blog-dshr-org-7824 54 1 We -PRON- PRP blog-dshr-org-7824 54 2 assume assume VBP blog-dshr-org-7824 54 3 maintainers maintainer NNS blog-dshr-org-7824 54 4 may may MD blog-dshr-org-7824 54 5 only only RB blog-dshr-org-7824 54 6 upload upload JJ blog-dshr-org-7824 54 7 signed sign VBN blog-dshr-org-7824 54 8 source source NN blog-dshr-org-7824 54 9 packages package NNS blog-dshr-org-7824 54 10 to to IN blog-dshr-org-7824 54 11 the the DT blog-dshr-org-7824 54 12 archive archive NN blog-dshr-org-7824 54 13 , , , blog-dshr-org-7824 54 14 not not RB blog-dshr-org-7824 54 15 binary binary JJ blog-dshr-org-7824 54 16 packages package NNS blog-dshr-org-7824 54 17 . . . blog-dshr-org-7824 55 1 The the DT blog-dshr-org-7824 55 2 archive archive JJ blog-dshr-org-7824 55 3 submits submit VBZ blog-dshr-org-7824 55 4 source source NN blog-dshr-org-7824 55 5 packages package NNS blog-dshr-org-7824 55 6 to to IN blog-dshr-org-7824 55 7 one one CD blog-dshr-org-7824 55 8 or or CC blog-dshr-org-7824 55 9 more more JJR blog-dshr-org-7824 55 10 log log NN blog-dshr-org-7824 55 11 servers server NNS blog-dshr-org-7824 55 12 . . . blog-dshr-org-7824 56 1 We -PRON- PRP blog-dshr-org-7824 56 2 further further RB blog-dshr-org-7824 56 3 assume assume VBP blog-dshr-org-7824 56 4 that that IN blog-dshr-org-7824 56 5 the the DT blog-dshr-org-7824 56 6 buildinfo buildinfo NN blog-dshr-org-7824 56 7 files file NNS blog-dshr-org-7824 56 8 capturing capture VBG blog-dshr-org-7824 56 9 the the DT blog-dshr-org-7824 56 10 build build NN blog-dshr-org-7824 56 11 environment environment NN blog-dshr-org-7824 56 12 are be VBP blog-dshr-org-7824 56 13 signed sign VBN blog-dshr-org-7824 56 14 and and CC blog-dshr-org-7824 56 15 are be VBP blog-dshr-org-7824 56 16 made make VBN blog-dshr-org-7824 56 17 public public JJ blog-dshr-org-7824 56 18 , , , blog-dshr-org-7824 56 19 e.g. e.g. RB blog-dshr-org-7824 57 1 by by IN blog-dshr-org-7824 57 2 them -PRON- PRP blog-dshr-org-7824 57 3 being be VBG blog-dshr-org-7824 57 4 covered cover VBN blog-dshr-org-7824 57 5 by by IN blog-dshr-org-7824 57 6 the the DT blog-dshr-org-7824 57 7 release release NN blog-dshr-org-7824 57 8 file file NN blog-dshr-org-7824 57 9 , , , blog-dshr-org-7824 57 10 together together RB blog-dshr-org-7824 57 11 with with IN blog-dshr-org-7824 57 12 other other JJ blog-dshr-org-7824 57 13 meta meta JJ blog-dshr-org-7824 57 14 data datum NNS blog-dshr-org-7824 57 15 . . . blog-dshr-org-7824 58 1 In in IN blog-dshr-org-7824 58 2 order order NN blog-dshr-org-7824 58 3 to to TO blog-dshr-org-7824 58 4 make make VB blog-dshr-org-7824 58 5 the the DT blog-dshr-org-7824 58 6 maintainers maintainer NNS blog-dshr-org-7824 58 7 uploading upload VBG blog-dshr-org-7824 58 8 a a DT blog-dshr-org-7824 58 9 package package NN blog-dshr-org-7824 58 10 accountable accountable JJ blog-dshr-org-7824 58 11 , , , blog-dshr-org-7824 58 12 a a DT blog-dshr-org-7824 58 13 source source NN blog-dshr-org-7824 58 14 package package NN blog-dshr-org-7824 58 15 containing contain VBG blog-dshr-org-7824 58 16 all all DT blog-dshr-org-7824 58 17 maintainer maintainer NN blog-dshr-org-7824 58 18 keys key NNS blog-dshr-org-7824 58 19 is be VBZ blog-dshr-org-7824 58 20 created create VBN blog-dshr-org-7824 58 21 and and CC blog-dshr-org-7824 58 22 submitted submit VBN blog-dshr-org-7824 58 23 into into IN blog-dshr-org-7824 58 24 the the DT blog-dshr-org-7824 58 25 archive archive NN blog-dshr-org-7824 58 26 . . . blog-dshr-org-7824 59 1 This this DT blog-dshr-org-7824 59 2 constitutes constitute VBZ blog-dshr-org-7824 59 3 the the DT blog-dshr-org-7824 59 4 declaration declaration NN blog-dshr-org-7824 59 5 by by IN blog-dshr-org-7824 59 6 the the DT blog-dshr-org-7824 59 7 archive archive NN blog-dshr-org-7824 59 8 , , , blog-dshr-org-7824 59 9 that that IN blog-dshr-org-7824 59 10 these these DT blog-dshr-org-7824 59 11 keys key NNS blog-dshr-org-7824 59 12 were be VBD blog-dshr-org-7824 59 13 authorized authorize VBN blog-dshr-org-7824 59 14 to to TO blog-dshr-org-7824 59 15 upload upload VB blog-dshr-org-7824 59 16 for for IN blog-dshr-org-7824 59 17 this this DT blog-dshr-org-7824 59 18 release release NN blog-dshr-org-7824 59 19 . . . blog-dshr-org-7824 60 1 The the DT blog-dshr-org-7824 60 2 key key JJ blog-dshr-org-7824 60 3 ring ring NN blog-dshr-org-7824 60 4 is be VBZ blog-dshr-org-7824 60 5 required require VBN blog-dshr-org-7824 60 6 to to TO blog-dshr-org-7824 60 7 be be VB blog-dshr-org-7824 60 8 append append NN blog-dshr-org-7824 60 9 - - HYPH blog-dshr-org-7824 60 10 only only RB blog-dshr-org-7824 60 11 , , , blog-dshr-org-7824 60 12 where where WRB blog-dshr-org-7824 60 13 keys key NNS blog-dshr-org-7824 60 14 are be VBP blog-dshr-org-7824 60 15 marked mark VBN blog-dshr-org-7824 60 16 with with IN blog-dshr-org-7824 60 17 an an DT blog-dshr-org-7824 60 18 expiry expiry NN blog-dshr-org-7824 60 19 date date NN blog-dshr-org-7824 60 20 instead instead RB blog-dshr-org-7824 60 21 of of IN blog-dshr-org-7824 60 22 being be VBG blog-dshr-org-7824 60 23 removed remove VBN blog-dshr-org-7824 60 24 . . . blog-dshr-org-7824 61 1 This this DT blog-dshr-org-7824 61 2 allows allow VBZ blog-dshr-org-7824 61 3 verification verification NN blog-dshr-org-7824 61 4 of of IN blog-dshr-org-7824 61 5 source source NN blog-dshr-org-7824 61 6 packages package NNS blog-dshr-org-7824 61 7 submitted submit VBN blog-dshr-org-7824 61 8 long long RB blog-dshr-org-7824 61 9 ago ago RB blog-dshr-org-7824 61 10 , , , blog-dshr-org-7824 61 11 using use VBG blog-dshr-org-7824 61 12 the the DT blog-dshr-org-7824 61 13 keys key NNS blog-dshr-org-7824 61 14 valid valid JJ blog-dshr-org-7824 61 15 at at IN blog-dshr-org-7824 61 16 the the DT blog-dshr-org-7824 61 17 respective respective JJ blog-dshr-org-7824 61 18 point point NN blog-dshr-org-7824 61 19 in in IN blog-dshr-org-7824 61 20 time time NN blog-dshr-org-7824 61 21 . . . blog-dshr-org-7824 62 1 Just just RB blog-dshr-org-7824 62 2 as as IN blog-dshr-org-7824 62 3 with with IN blog-dshr-org-7824 62 4 CT CT NNP blog-dshr-org-7824 62 5 , , , blog-dshr-org-7824 62 6 the the DT blog-dshr-org-7824 62 7 log log NN blog-dshr-org-7824 62 8 replies reply VBZ blog-dshr-org-7824 62 9 to to IN blog-dshr-org-7824 62 10 each each DT blog-dshr-org-7824 62 11 valid valid JJ blog-dshr-org-7824 62 12 submission submission NN blog-dshr-org-7824 62 13 with with IN blog-dshr-org-7824 62 14 a a DT blog-dshr-org-7824 62 15 signed sign VBN blog-dshr-org-7824 62 16 commitment commitment NN blog-dshr-org-7824 62 17 , , , blog-dshr-org-7824 62 18 guaranteeing guarantee VBG blog-dshr-org-7824 62 19 that that IN blog-dshr-org-7824 62 20 it -PRON- PRP blog-dshr-org-7824 62 21 will will MD blog-dshr-org-7824 62 22 shortly shortly RB blog-dshr-org-7824 62 23 produce produce VB blog-dshr-org-7824 62 24 the the DT blog-dshr-org-7824 62 25 signed sign VBN blog-dshr-org-7824 62 26 root root NN blog-dshr-org-7824 62 27 of of IN blog-dshr-org-7824 62 28 a a DT blog-dshr-org-7824 62 29 Merkle Merkle NNP blog-dshr-org-7824 62 30 tree tree NN blog-dshr-org-7824 62 31 that that WDT blog-dshr-org-7824 62 32 includes include VBZ blog-dshr-org-7824 62 33 the the DT blog-dshr-org-7824 62 34 submission submission NN blog-dshr-org-7824 62 35 : : : blog-dshr-org-7824 62 36 At at IN blog-dshr-org-7824 62 37 release release NN blog-dshr-org-7824 62 38 time time NN blog-dshr-org-7824 62 39 , , , blog-dshr-org-7824 62 40 meta meta JJ blog-dshr-org-7824 62 41 data datum NNS blog-dshr-org-7824 62 42 and and CC blog-dshr-org-7824 62 43 release release NN blog-dshr-org-7824 62 44 file file NN blog-dshr-org-7824 62 45 are be VBP blog-dshr-org-7824 62 46 submitted submit VBN blog-dshr-org-7824 62 47 into into IN blog-dshr-org-7824 62 48 the the DT blog-dshr-org-7824 62 49 log log NN blog-dshr-org-7824 62 50 as as RB blog-dshr-org-7824 62 51 well well RB blog-dshr-org-7824 62 52 . . . blog-dshr-org-7824 63 1 The the DT blog-dshr-org-7824 63 2 log log NN blog-dshr-org-7824 63 3 server server NN blog-dshr-org-7824 63 4 produces produce VBZ blog-dshr-org-7824 63 5 a a DT blog-dshr-org-7824 63 6 commitment commitment NN blog-dshr-org-7824 63 7 for for IN blog-dshr-org-7824 63 8 each each DT blog-dshr-org-7824 63 9 submission submission NN blog-dshr-org-7824 63 10 , , , blog-dshr-org-7824 63 11 which which WDT blog-dshr-org-7824 63 12 constitutes constitute VBZ blog-dshr-org-7824 63 13 its -PRON- PRP$ blog-dshr-org-7824 63 14 promise promise NN blog-dshr-org-7824 63 15 to to TO blog-dshr-org-7824 63 16 include include VB blog-dshr-org-7824 63 17 the the DT blog-dshr-org-7824 63 18 submitted submitted JJ blog-dshr-org-7824 63 19 item item NN blog-dshr-org-7824 63 20 into into IN blog-dshr-org-7824 63 21 a a DT blog-dshr-org-7824 63 22 future future JJ blog-dshr-org-7824 63 23 version version NN blog-dshr-org-7824 63 24 of of IN blog-dshr-org-7824 63 25 the the DT blog-dshr-org-7824 63 26 tree tree NN blog-dshr-org-7824 63 27 . . . blog-dshr-org-7824 64 1 The the DT blog-dshr-org-7824 64 2 log log NN blog-dshr-org-7824 64 3 only only RB blog-dshr-org-7824 64 4 accepts accept VBZ blog-dshr-org-7824 64 5 authenticated authenticate VBN blog-dshr-org-7824 64 6 submissions submission NNS blog-dshr-org-7824 64 7 from from IN blog-dshr-org-7824 64 8 the the DT blog-dshr-org-7824 64 9 archive archive NN blog-dshr-org-7824 64 10 . . . blog-dshr-org-7824 65 1 The the DT blog-dshr-org-7824 65 2 commitment commitment NN blog-dshr-org-7824 65 3 includes include VBZ blog-dshr-org-7824 65 4 a a DT blog-dshr-org-7824 65 5 timestamp timestamp NN blog-dshr-org-7824 65 6 , , , blog-dshr-org-7824 65 7 hash hash NN blog-dshr-org-7824 65 8 of of IN blog-dshr-org-7824 65 9 the the DT blog-dshr-org-7824 65 10 release release NN blog-dshr-org-7824 65 11 file file NN blog-dshr-org-7824 65 12 , , , blog-dshr-org-7824 65 13 log log NNP blog-dshr-org-7824 65 14 identifier identifier NNP blog-dshr-org-7824 65 15 and and CC blog-dshr-org-7824 65 16 the the DT blog-dshr-org-7824 65 17 log log NN blog-dshr-org-7824 65 18 's 's POS blog-dshr-org-7824 65 19 signature signature NN blog-dshr-org-7824 65 20 over over IN blog-dshr-org-7824 65 21 these these DT blog-dshr-org-7824 65 22 . . . blog-dshr-org-7824 66 1 The the DT blog-dshr-org-7824 66 2 archive archive NN blog-dshr-org-7824 66 3 should should MD blog-dshr-org-7824 66 4 then then RB blog-dshr-org-7824 66 5 verify verify VB blog-dshr-org-7824 66 6 that that IN blog-dshr-org-7824 66 7 the the DT blog-dshr-org-7824 66 8 log log NN blog-dshr-org-7824 66 9 has have VBZ blog-dshr-org-7824 66 10 produced produce VBN blog-dshr-org-7824 66 11 a a DT blog-dshr-org-7824 66 12 signed sign VBN blog-dshr-org-7824 66 13 tree tree NN blog-dshr-org-7824 66 14 root root NN blog-dshr-org-7824 66 15 that that WDT blog-dshr-org-7824 66 16 resolves resolve VBZ blog-dshr-org-7824 66 17 the the DT blog-dshr-org-7824 66 18 commitment commitment NN blog-dshr-org-7824 66 19 . . . blog-dshr-org-7824 67 1 To to TO blog-dshr-org-7824 67 2 complete complete VB blog-dshr-org-7824 67 3 the the DT blog-dshr-org-7824 67 4 release release NN blog-dshr-org-7824 67 5 , , , blog-dshr-org-7824 67 6 the the DT blog-dshr-org-7824 67 7 archive archive NN blog-dshr-org-7824 67 8 publishes publish VBZ blog-dshr-org-7824 67 9 the the DT blog-dshr-org-7824 67 10 commitments commitment NNS blog-dshr-org-7824 67 11 together together RB blog-dshr-org-7824 67 12 with with IN blog-dshr-org-7824 67 13 the the DT blog-dshr-org-7824 67 14 updates update NNS blog-dshr-org-7824 67 15 . . . blog-dshr-org-7824 68 1 Clients client NNS blog-dshr-org-7824 68 2 can can MD blog-dshr-org-7824 68 3 then then RB blog-dshr-org-7824 68 4 proceed proceed VB blog-dshr-org-7824 68 5 with with IN blog-dshr-org-7824 68 6 the the DT blog-dshr-org-7824 68 7 verification verification NN blog-dshr-org-7824 68 8 of of IN blog-dshr-org-7824 68 9 the the DT blog-dshr-org-7824 68 10 release release NN blog-dshr-org-7824 68 11 file file NN blog-dshr-org-7824 68 12 . . . blog-dshr-org-7824 69 1 The the DT blog-dshr-org-7824 69 2 log log NN blog-dshr-org-7824 69 3 regularly regularly RB blog-dshr-org-7824 69 4 produces produce VBZ blog-dshr-org-7824 69 5 signed sign VBN blog-dshr-org-7824 69 6 Merkle Merkle NNP blog-dshr-org-7824 69 7 tree tree NN blog-dshr-org-7824 69 8 roots root NNS blog-dshr-org-7824 69 9 after after IN blog-dshr-org-7824 69 10 receiving receive VBG blog-dshr-org-7824 69 11 a a DT blog-dshr-org-7824 69 12 valid valid JJ blog-dshr-org-7824 69 13 inclusion inclusion NN blog-dshr-org-7824 69 14 request request NN blog-dshr-org-7824 69 15 . . . blog-dshr-org-7824 70 1 The the DT blog-dshr-org-7824 70 2 signed sign VBN blog-dshr-org-7824 70 3 tree tree NN blog-dshr-org-7824 70 4 root root NN blog-dshr-org-7824 70 5 produced produce VBN blog-dshr-org-7824 70 6 by by IN blog-dshr-org-7824 70 7 the the DT blog-dshr-org-7824 70 8 log log NN blog-dshr-org-7824 70 9 includes include VBZ blog-dshr-org-7824 70 10 the the DT blog-dshr-org-7824 70 11 Merkle Merkle NNP blog-dshr-org-7824 70 12 tree tree NN blog-dshr-org-7824 70 13 hash hash NN blog-dshr-org-7824 70 14 , , , blog-dshr-org-7824 70 15 tree tree NN blog-dshr-org-7824 70 16 size size NN blog-dshr-org-7824 70 17 , , , blog-dshr-org-7824 70 18 timestamp timestamp NN blog-dshr-org-7824 70 19 , , , blog-dshr-org-7824 70 20 log log NNP blog-dshr-org-7824 70 21 identifier identifier NNP blog-dshr-org-7824 70 22 , , , blog-dshr-org-7824 70 23 and and CC blog-dshr-org-7824 70 24 the the DT blog-dshr-org-7824 70 25 log log NN blog-dshr-org-7824 70 26 's 's POS blog-dshr-org-7824 70 27 signature signature NN blog-dshr-org-7824 70 28 . . . blog-dshr-org-7824 71 1 The the DT blog-dshr-org-7824 71 2 client client NN blog-dshr-org-7824 71 3 now now RB blog-dshr-org-7824 71 4 obtains obtain VBZ blog-dshr-org-7824 71 5 from from IN blog-dshr-org-7824 71 6 the the DT blog-dshr-org-7824 71 7 distribution distribution NN blog-dshr-org-7824 71 8 mirror mirror NN blog-dshr-org-7824 71 9 not not RB blog-dshr-org-7824 71 10 just just RB blog-dshr-org-7824 71 11 the the DT blog-dshr-org-7824 71 12 release release NN blog-dshr-org-7824 71 13 file file NN blog-dshr-org-7824 71 14 , , , blog-dshr-org-7824 71 15 but but CC blog-dshr-org-7824 71 16 also also RB blog-dshr-org-7824 71 17 one one CD blog-dshr-org-7824 71 18 or or CC blog-dshr-org-7824 71 19 more more JJR blog-dshr-org-7824 71 20 inclusion inclusion NN blog-dshr-org-7824 71 21 commitments commitment NNS blog-dshr-org-7824 71 22 showing show VBG blog-dshr-org-7824 71 23 that that IN blog-dshr-org-7824 71 24 the the DT blog-dshr-org-7824 71 25 release release NN blog-dshr-org-7824 71 26 file file NN blog-dshr-org-7824 71 27 has have VBZ blog-dshr-org-7824 71 28 been be VBN blog-dshr-org-7824 71 29 submitted submit VBN blog-dshr-org-7824 71 30 to to IN blog-dshr-org-7824 71 31 one one CD blog-dshr-org-7824 71 32 or or CC blog-dshr-org-7824 71 33 more more JJR blog-dshr-org-7824 71 34 of of IN blog-dshr-org-7824 71 35 the the DT blog-dshr-org-7824 71 36 logs log NNS blog-dshr-org-7824 71 37 trusted trust VBD blog-dshr-org-7824 71 38 both both CC blog-dshr-org-7824 71 39 by by IN blog-dshr-org-7824 71 40 the the DT blog-dshr-org-7824 71 41 distributor distributor NN blog-dshr-org-7824 71 42 and and CC blog-dshr-org-7824 71 43 the the DT blog-dshr-org-7824 71 44 client client NN blog-dshr-org-7824 71 45 : : : blog-dshr-org-7824 71 46 Given give VBN blog-dshr-org-7824 71 47 the the DT blog-dshr-org-7824 71 48 release release NN blog-dshr-org-7824 71 49 file file NN blog-dshr-org-7824 71 50 and and CC blog-dshr-org-7824 71 51 inclusion inclusion NN blog-dshr-org-7824 71 52 commitment commitment NN blog-dshr-org-7824 71 53 , , , blog-dshr-org-7824 71 54 the the DT blog-dshr-org-7824 71 55 client client NN blog-dshr-org-7824 71 56 can can MD blog-dshr-org-7824 71 57 verify verify VB blog-dshr-org-7824 71 58 by by IN blog-dshr-org-7824 71 59 hashing hash VBG blog-dshr-org-7824 71 60 that that IN blog-dshr-org-7824 71 61 the the DT blog-dshr-org-7824 71 62 commitment commitment NN blog-dshr-org-7824 71 63 belongs belong VBZ blog-dshr-org-7824 71 64 to to IN blog-dshr-org-7824 71 65 this this DT blog-dshr-org-7824 71 66 release release NN blog-dshr-org-7824 71 67 file file NN blog-dshr-org-7824 71 68 and and CC blog-dshr-org-7824 71 69 also also RB blog-dshr-org-7824 71 70 verify verify VBP blog-dshr-org-7824 71 71 the the DT blog-dshr-org-7824 71 72 signature signature NN blog-dshr-org-7824 71 73 . . . blog-dshr-org-7824 72 1 The the DT blog-dshr-org-7824 72 2 client client NN blog-dshr-org-7824 72 3 can can MD blog-dshr-org-7824 72 4 now now RB blog-dshr-org-7824 72 5 query query VB blog-dshr-org-7824 72 6 the the DT blog-dshr-org-7824 72 7 log log NN blog-dshr-org-7824 72 8 , , , blog-dshr-org-7824 72 9 demanding demand VBG blog-dshr-org-7824 72 10 a a DT blog-dshr-org-7824 72 11 current current JJ blog-dshr-org-7824 72 12 tree tree NN blog-dshr-org-7824 72 13 root root NN blog-dshr-org-7824 72 14 and and CC blog-dshr-org-7824 72 15 an an DT blog-dshr-org-7824 72 16 inclusion inclusion NN blog-dshr-org-7824 72 17 proof proof NN blog-dshr-org-7824 72 18 for for IN blog-dshr-org-7824 72 19 this this DT blog-dshr-org-7824 72 20 release release NN blog-dshr-org-7824 72 21 file file NN blog-dshr-org-7824 72 22 . . . blog-dshr-org-7824 73 1 Per per IN blog-dshr-org-7824 73 2 standard standard JJ blog-dshr-org-7824 73 3 Merkle Merkle NNP blog-dshr-org-7824 73 4 tree tree NN blog-dshr-org-7824 73 5 proofs proof NNS blog-dshr-org-7824 73 6 , , , blog-dshr-org-7824 73 7 the the DT blog-dshr-org-7824 73 8 inclusion inclusion NN blog-dshr-org-7824 73 9 proof proof NN blog-dshr-org-7824 73 10 consists consist VBZ blog-dshr-org-7824 73 11 of of IN blog-dshr-org-7824 73 12 a a DT blog-dshr-org-7824 73 13 list list NN blog-dshr-org-7824 73 14 of of IN blog-dshr-org-7824 73 15 hashes hash NNS blog-dshr-org-7824 73 16 to to TO blog-dshr-org-7824 73 17 recompute recompute VB blog-dshr-org-7824 73 18 the the DT blog-dshr-org-7824 73 19 received received JJ blog-dshr-org-7824 73 20 root root NN blog-dshr-org-7824 73 21 hash hash NN blog-dshr-org-7824 73 22 . . . blog-dshr-org-7824 74 1 For for IN blog-dshr-org-7824 74 2 the the DT blog-dshr-org-7824 74 3 received received JJ blog-dshr-org-7824 74 4 tree tree NN blog-dshr-org-7824 74 5 root root NN blog-dshr-org-7824 74 6 , , , blog-dshr-org-7824 74 7 a a DT blog-dshr-org-7824 74 8 consistency consistency NN blog-dshr-org-7824 74 9 proof proof NN blog-dshr-org-7824 74 10 is be VBZ blog-dshr-org-7824 74 11 demanded demand VBN blog-dshr-org-7824 74 12 to to IN blog-dshr-org-7824 74 13 a a DT blog-dshr-org-7824 74 14 previous previous JJ blog-dshr-org-7824 74 15 known know VBN blog-dshr-org-7824 74 16 tree tree NN blog-dshr-org-7824 74 17 root root NN blog-dshr-org-7824 74 18 . . . blog-dshr-org-7824 75 1 The the DT blog-dshr-org-7824 75 2 consistency consistency NN blog-dshr-org-7824 75 3 proof proof NN blog-dshr-org-7824 75 4 is be VBZ blog-dshr-org-7824 75 5 again again RB blog-dshr-org-7824 75 6 a a DT blog-dshr-org-7824 75 7 list list NN blog-dshr-org-7824 75 8 of of IN blog-dshr-org-7824 75 9 hashes hash NNS blog-dshr-org-7824 75 10 . . . blog-dshr-org-7824 76 1 For for IN blog-dshr-org-7824 76 2 the the DT blog-dshr-org-7824 76 3 two two CD blog-dshr-org-7824 76 4 given give VBN blog-dshr-org-7824 76 5 tree tree NN blog-dshr-org-7824 76 6 roots root NNS blog-dshr-org-7824 76 7 , , , blog-dshr-org-7824 76 8 it -PRON- PRP blog-dshr-org-7824 76 9 shows show VBZ blog-dshr-org-7824 76 10 that that IN blog-dshr-org-7824 76 11 the the DT blog-dshr-org-7824 76 12 log log NN blog-dshr-org-7824 76 13 only only RB blog-dshr-org-7824 76 14 added add VBD blog-dshr-org-7824 76 15 items item NNS blog-dshr-org-7824 76 16 between between IN blog-dshr-org-7824 76 17 them -PRON- PRP blog-dshr-org-7824 76 18 . . . blog-dshr-org-7824 77 1 Clients client NNS blog-dshr-org-7824 77 2 store store VBP blog-dshr-org-7824 77 3 the the DT blog-dshr-org-7824 77 4 signed sign VBN blog-dshr-org-7824 77 5 tree tree NN blog-dshr-org-7824 77 6 root root NN blog-dshr-org-7824 77 7 for for IN blog-dshr-org-7824 77 8 the the DT blog-dshr-org-7824 77 9 largest large JJS blog-dshr-org-7824 77 10 tree tree NN blog-dshr-org-7824 77 11 they -PRON- PRP blog-dshr-org-7824 77 12 have have VBP blog-dshr-org-7824 77 13 seen see VBN blog-dshr-org-7824 77 14 , , , blog-dshr-org-7824 77 15 to to TO blog-dshr-org-7824 77 16 be be VB blog-dshr-org-7824 77 17 used use VBN blog-dshr-org-7824 77 18 in in IN blog-dshr-org-7824 77 19 any any DT blog-dshr-org-7824 77 20 later later JJ blog-dshr-org-7824 77 21 consistency consistency NN blog-dshr-org-7824 77 22 proofs proof NNS blog-dshr-org-7824 77 23 . . . blog-dshr-org-7824 78 1 Set Set VBN blog-dshr-org-7824 78 2 aside aside RB blog-dshr-org-7824 78 3 split split VBD blog-dshr-org-7824 78 4 view view NN blog-dshr-org-7824 78 5 attacks attack NNS blog-dshr-org-7824 78 6 , , , blog-dshr-org-7824 78 7 which which WDT blog-dshr-org-7824 78 8 will will MD blog-dshr-org-7824 78 9 be be VB blog-dshr-org-7824 78 10 discussed discuss VBN blog-dshr-org-7824 78 11 later later RB blog-dshr-org-7824 78 12 , , , blog-dshr-org-7824 78 13 clients client NNS blog-dshr-org-7824 78 14 verifying verify VBG blog-dshr-org-7824 78 15 the the DT blog-dshr-org-7824 78 16 log log NN blog-dshr-org-7824 78 17 inclusion inclusion NN blog-dshr-org-7824 78 18 of of IN blog-dshr-org-7824 78 19 the the DT blog-dshr-org-7824 78 20 release release NN blog-dshr-org-7824 78 21 file file NN blog-dshr-org-7824 78 22 will will MD blog-dshr-org-7824 78 23 detect detect VB blog-dshr-org-7824 78 24 targeted target VBN blog-dshr-org-7824 78 25 modifications modification NNS blog-dshr-org-7824 78 26 of of IN blog-dshr-org-7824 78 27 the the DT blog-dshr-org-7824 78 28 release release NN blog-dshr-org-7824 78 29 . . . blog-dshr-org-7824 79 1 Like like IN blog-dshr-org-7824 79 2 CT CT NNP blog-dshr-org-7824 79 3 , , , blog-dshr-org-7824 79 4 in in IN blog-dshr-org-7824 79 5 addition addition NN blog-dshr-org-7824 79 6 to to TO blog-dshr-org-7824 79 7 logs logs VB blog-dshr-org-7824 79 8 their -PRON- PRP$ blog-dshr-org-7824 79 9 system system NN blog-dshr-org-7824 79 10 includes include VBZ blog-dshr-org-7824 79 11 auditors auditor NNS blog-dshr-org-7824 79 12 , , , blog-dshr-org-7824 79 13 typically typically RB blog-dshr-org-7824 79 14 integrated integrate VBN blog-dshr-org-7824 79 15 with with IN blog-dshr-org-7824 79 16 clients client NNS blog-dshr-org-7824 79 17 , , , blog-dshr-org-7824 79 18 and and CC blog-dshr-org-7824 79 19 independent independent JJ blog-dshr-org-7824 79 20 monitors monitor NNS blog-dshr-org-7824 79 21 regularly regularly RB blog-dshr-org-7824 79 22 checking check VBG blog-dshr-org-7824 79 23 the the DT blog-dshr-org-7824 79 24 logs log NNS blog-dshr-org-7824 79 25 for for IN blog-dshr-org-7824 79 26 anomalies anomaly NNS blog-dshr-org-7824 79 27 . . . blog-dshr-org-7824 80 1 For for IN blog-dshr-org-7824 80 2 details detail NNS blog-dshr-org-7824 80 3 , , , blog-dshr-org-7824 80 4 you -PRON- PRP blog-dshr-org-7824 80 5 need need VBP blog-dshr-org-7824 80 6 to to TO blog-dshr-org-7824 80 7 read read VB blog-dshr-org-7824 80 8 the the DT blog-dshr-org-7824 80 9 paper paper NN blog-dshr-org-7824 80 10 , , , blog-dshr-org-7824 80 11 but but CC blog-dshr-org-7824 80 12 some some DT blog-dshr-org-7824 80 13 idea idea NN blog-dshr-org-7824 80 14 can can MD blog-dshr-org-7824 80 15 be be VB blog-dshr-org-7824 80 16 gained gain VBN blog-dshr-org-7824 80 17 from from IN blog-dshr-org-7824 80 18 their -PRON- PRP$ blog-dshr-org-7824 80 19 description description NN blog-dshr-org-7824 80 20 of of IN blog-dshr-org-7824 80 21 how how WRB blog-dshr-org-7824 80 22 the the DT blog-dshr-org-7824 80 23 system system NN blog-dshr-org-7824 80 24 detects detect VBZ blog-dshr-org-7824 80 25 two two CD blog-dshr-org-7824 80 26 kinds kind NNS blog-dshr-org-7824 80 27 of of IN blog-dshr-org-7824 80 28 attack attack NN blog-dshr-org-7824 80 29 : : : blog-dshr-org-7824 80 30 The the DT blog-dshr-org-7824 80 31 Hidden Hidden NNP blog-dshr-org-7824 80 32 Version Version NNP blog-dshr-org-7824 80 33 Attack Attack NNP blog-dshr-org-7824 80 34 The the DT blog-dshr-org-7824 80 35 Split Split NNP blog-dshr-org-7824 80 36 View View NNP blog-dshr-org-7824 80 37 Attack Attack NNP blog-dshr-org-7824 80 38 The the DT blog-dshr-org-7824 80 39 Hidden Hidden NNP blog-dshr-org-7824 80 40 Version Version NNP blog-dshr-org-7824 80 41 Attack Attack NNP blog-dshr-org-7824 80 42 Hof Hof NNP blog-dshr-org-7824 80 43 and and CC blog-dshr-org-7824 80 44 Carle Carle NNP blog-dshr-org-7824 80 45 describe describe VBP blog-dshr-org-7824 80 46 this this DT blog-dshr-org-7824 80 47 attack attack NN blog-dshr-org-7824 80 48 thus thus RB blog-dshr-org-7824 80 49 : : : blog-dshr-org-7824 80 50 The the DT blog-dshr-org-7824 80 51 hidden hidden JJ blog-dshr-org-7824 80 52 version version NN blog-dshr-org-7824 80 53 attack attack NN blog-dshr-org-7824 80 54 attempts attempt NNS blog-dshr-org-7824 80 55 to to TO blog-dshr-org-7824 80 56 hide hide VB blog-dshr-org-7824 80 57 a a DT blog-dshr-org-7824 80 58 targeted target VBN blog-dshr-org-7824 80 59 backdoor backdoor NN blog-dshr-org-7824 80 60 by by IN blog-dshr-org-7824 80 61 following follow VBG blog-dshr-org-7824 80 62 correct correct JJ blog-dshr-org-7824 80 63 signing signing NN blog-dshr-org-7824 80 64 and and CC blog-dshr-org-7824 80 65 log log NN blog-dshr-org-7824 80 66 submission submission NN blog-dshr-org-7824 80 67 procedures procedure NNS blog-dshr-org-7824 80 68 . . . blog-dshr-org-7824 81 1 It -PRON- PRP blog-dshr-org-7824 81 2 may may MD blog-dshr-org-7824 81 3 require require VB blog-dshr-org-7824 81 4 collusion collusion NN blog-dshr-org-7824 81 5 by by IN blog-dshr-org-7824 81 6 the the DT blog-dshr-org-7824 81 7 archive archive NN blog-dshr-org-7824 81 8 and and CC blog-dshr-org-7824 81 9 an an DT blog-dshr-org-7824 81 10 authorized authorize VBN blog-dshr-org-7824 81 11 maintainer maintainer NN blog-dshr-org-7824 81 12 . . . blog-dshr-org-7824 82 1 The the DT blog-dshr-org-7824 82 2 attacker attacker NN blog-dshr-org-7824 82 3 prepares prepare NNS blog-dshr-org-7824 82 4 targeted target VBN blog-dshr-org-7824 82 5 malicious malicious JJ blog-dshr-org-7824 82 6 update update NN blog-dshr-org-7824 82 7 to to IN blog-dshr-org-7824 82 8 a a DT blog-dshr-org-7824 82 9 package package NN blog-dshr-org-7824 82 10 , , , blog-dshr-org-7824 82 11 say say VBP blog-dshr-org-7824 82 12 version version NN blog-dshr-org-7824 82 13 v1.2.1 v1.2.1 NNP blog-dshr-org-7824 82 14 , , , blog-dshr-org-7824 82 15 and and CC blog-dshr-org-7824 82 16 a a DT blog-dshr-org-7824 82 17 clean clean JJ blog-dshr-org-7824 82 18 update update NN blog-dshr-org-7824 82 19 v1.3.0 v1.3.0 NNP blog-dshr-org-7824 82 20 . . . blog-dshr-org-7824 83 1 The the DT blog-dshr-org-7824 83 2 archive archive JJ blog-dshr-org-7824 83 3 presents present VBZ blog-dshr-org-7824 83 4 the the DT blog-dshr-org-7824 83 5 malicious malicious JJ blog-dshr-org-7824 83 6 package package NN blog-dshr-org-7824 83 7 only only RB blog-dshr-org-7824 83 8 to to IN blog-dshr-org-7824 83 9 the the DT blog-dshr-org-7824 83 10 victim victim NN blog-dshr-org-7824 83 11 when when WRB blog-dshr-org-7824 83 12 it -PRON- PRP blog-dshr-org-7824 83 13 wishes wish VBZ blog-dshr-org-7824 83 14 to to TO blog-dshr-org-7824 83 15 update update VB blog-dshr-org-7824 83 16 . . . blog-dshr-org-7824 84 1 The the DT blog-dshr-org-7824 84 2 clean clean JJ blog-dshr-org-7824 84 3 version version NN blog-dshr-org-7824 84 4 v.1.3.0 v.1.3.0 NNP blog-dshr-org-7824 84 5 will will MD blog-dshr-org-7824 84 6 be be VB blog-dshr-org-7824 84 7 presented present VBN blog-dshr-org-7824 84 8 to to IN blog-dshr-org-7824 84 9 everybody everybody NN blog-dshr-org-7824 84 10 immediately immediately RB blog-dshr-org-7824 84 11 afterwards afterwards RB blog-dshr-org-7824 84 12 . . . blog-dshr-org-7824 85 1 A a DT blog-dshr-org-7824 85 2 non non JJ blog-dshr-org-7824 85 3 - - JJ blog-dshr-org-7824 85 4 targeted targeted JJ blog-dshr-org-7824 85 5 user user NN blog-dshr-org-7824 85 6 is be VBZ blog-dshr-org-7824 85 7 unlikely unlikely JJ blog-dshr-org-7824 85 8 to to TO blog-dshr-org-7824 85 9 ever ever RB blog-dshr-org-7824 85 10 observe observe VB blog-dshr-org-7824 85 11 the the DT blog-dshr-org-7824 85 12 backdoored backdoore VBN blog-dshr-org-7824 85 13 version version NN blog-dshr-org-7824 85 14 , , , blog-dshr-org-7824 85 15 thereby thereby RB blog-dshr-org-7824 85 16 drawing draw VBG blog-dshr-org-7824 85 17 a a DT blog-dshr-org-7824 85 18 minimal minimal JJ blog-dshr-org-7824 85 19 amount amount NN blog-dshr-org-7824 85 20 of of IN blog-dshr-org-7824 85 21 attention attention NN blog-dshr-org-7824 85 22 to to IN blog-dshr-org-7824 85 23 it -PRON- PRP blog-dshr-org-7824 85 24 . . . blog-dshr-org-7824 86 1 The the DT blog-dshr-org-7824 86 2 attack attack NN blog-dshr-org-7824 86 3 however however RB blog-dshr-org-7824 86 4 leaves leave VBZ blog-dshr-org-7824 86 5 an an DT blog-dshr-org-7824 86 6 audit audit NN blog-dshr-org-7824 86 7 trail trail NN blog-dshr-org-7824 86 8 in in IN blog-dshr-org-7824 86 9 the the DT blog-dshr-org-7824 86 10 log log NN blog-dshr-org-7824 86 11 , , , blog-dshr-org-7824 86 12 so so RB blog-dshr-org-7824 86 13 the the DT blog-dshr-org-7824 86 14 update update NN blog-dshr-org-7824 86 15 itself -PRON- PRP blog-dshr-org-7824 86 16 can can MD blog-dshr-org-7824 86 17 be be VB blog-dshr-org-7824 86 18 detected detect VBN blog-dshr-org-7824 86 19 by by IN blog-dshr-org-7824 86 20 auditing audit VBG blog-dshr-org-7824 86 21 . . . blog-dshr-org-7824 87 1 A a DT blog-dshr-org-7824 87 2 package package NN blog-dshr-org-7824 87 3 maintainer maintainer NN blog-dshr-org-7824 87 4 monitoring monitoring NN blog-dshr-org-7824 87 5 uploads upload NNS blog-dshr-org-7824 87 6 for for IN blog-dshr-org-7824 87 7 their -PRON- PRP$ blog-dshr-org-7824 87 8 packages package NNS blog-dshr-org-7824 87 9 using use VBG blog-dshr-org-7824 87 10 the the DT blog-dshr-org-7824 87 11 log log NN blog-dshr-org-7824 87 12 would would MD blog-dshr-org-7824 87 13 notice notice VB blog-dshr-org-7824 87 14 an an DT blog-dshr-org-7824 87 15 additional additional JJ blog-dshr-org-7824 87 16 version version NN blog-dshr-org-7824 87 17 being be VBG blog-dshr-org-7824 87 18 published publish VBN blog-dshr-org-7824 87 19 . . . blog-dshr-org-7824 88 1 A a DT blog-dshr-org-7824 88 2 malicious malicious JJ blog-dshr-org-7824 88 3 package package NN blog-dshr-org-7824 88 4 maintainer maintainer NN blog-dshr-org-7824 88 5 would would MD blog-dshr-org-7824 88 6 however however RB blog-dshr-org-7824 88 7 not not RB blog-dshr-org-7824 88 8 alert alert VB blog-dshr-org-7824 88 9 the the DT blog-dshr-org-7824 88 10 public public NN blog-dshr-org-7824 88 11 when when WRB blog-dshr-org-7824 88 12 this this DT blog-dshr-org-7824 88 13 happens happen VBZ blog-dshr-org-7824 88 14 . . . blog-dshr-org-7824 89 1 This this DT blog-dshr-org-7824 89 2 could could MD blog-dshr-org-7824 89 3 be be VB blog-dshr-org-7824 89 4 construed construe VBN blog-dshr-org-7824 89 5 as as IN blog-dshr-org-7824 89 6 a a DT blog-dshr-org-7824 89 7 targeted targeted JJ blog-dshr-org-7824 89 8 backdoor backdoor NN blog-dshr-org-7824 89 9 in in IN blog-dshr-org-7824 89 10 violation violation NN blog-dshr-org-7824 89 11 of of IN blog-dshr-org-7824 89 12 the the DT blog-dshr-org-7824 89 13 stated stated JJ blog-dshr-org-7824 89 14 security security NN blog-dshr-org-7824 89 15 goals goal NNS blog-dshr-org-7824 89 16 . . . blog-dshr-org-7824 90 1 It -PRON- PRP blog-dshr-org-7824 90 2 is be VBZ blog-dshr-org-7824 90 3 true true JJ blog-dshr-org-7824 90 4 that that IN blog-dshr-org-7824 90 5 the the DT blog-dshr-org-7824 90 6 backdoored backdoore VBN blog-dshr-org-7824 90 7 package package NN blog-dshr-org-7824 90 8 would would MD blog-dshr-org-7824 90 9 be be VB blog-dshr-org-7824 90 10 in in IN blog-dshr-org-7824 90 11 the the DT blog-dshr-org-7824 90 12 logs log NNS blog-dshr-org-7824 90 13 , , , blog-dshr-org-7824 90 14 but but CC blog-dshr-org-7824 90 15 that that IN blog-dshr-org-7824 90 16 in in IN blog-dshr-org-7824 90 17 and and CC blog-dshr-org-7824 90 18 of of IN blog-dshr-org-7824 90 19 itself -PRON- PRP blog-dshr-org-7824 90 20 does do VBZ blog-dshr-org-7824 90 21 not not RB blog-dshr-org-7824 90 22 indicate indicate VB blog-dshr-org-7824 90 23 that that IN blog-dshr-org-7824 90 24 it -PRON- PRP blog-dshr-org-7824 90 25 is be VBZ blog-dshr-org-7824 90 26 malign malign NN blog-dshr-org-7824 90 27 : : : blog-dshr-org-7824 90 28 To to TO blog-dshr-org-7824 90 29 mitigate mitigate VB blog-dshr-org-7824 90 30 this this DT blog-dshr-org-7824 90 31 problem problem NN blog-dshr-org-7824 90 32 a a DT blog-dshr-org-7824 90 33 minimum minimum JJ blog-dshr-org-7824 90 34 time time NN blog-dshr-org-7824 90 35 between between IN blog-dshr-org-7824 90 36 package package NN blog-dshr-org-7824 90 37 updates update NNS blog-dshr-org-7824 90 38 can can MD blog-dshr-org-7824 90 39 be be VB blog-dshr-org-7824 90 40 introduced introduce VBN blog-dshr-org-7824 90 41 . . . blog-dshr-org-7824 91 1 This this DT blog-dshr-org-7824 91 2 can can MD blog-dshr-org-7824 91 3 be be VB blog-dshr-org-7824 91 4 achieved achieve VBN blog-dshr-org-7824 91 5 by by IN blog-dshr-org-7824 91 6 a a DT blog-dshr-org-7824 91 7 fixing fix VBG blog-dshr-org-7824 91 8 the the DT blog-dshr-org-7824 91 9 issuance issuance NN blog-dshr-org-7824 91 10 of of IN blog-dshr-org-7824 91 11 release release NN blog-dshr-org-7824 91 12 files file NNS blog-dshr-org-7824 91 13 and and CC blog-dshr-org-7824 91 14 their -PRON- PRP$ blog-dshr-org-7824 91 15 log log NN blog-dshr-org-7824 91 16 submission submission NN blog-dshr-org-7824 91 17 to to IN blog-dshr-org-7824 91 18 a a DT blog-dshr-org-7824 91 19 static static JJ blog-dshr-org-7824 91 20 frequency frequency NN blog-dshr-org-7824 91 21 , , , blog-dshr-org-7824 91 22 or or CC blog-dshr-org-7824 91 23 by by IN blog-dshr-org-7824 91 24 alerting alert VBG blog-dshr-org-7824 91 25 on on IN blog-dshr-org-7824 91 26 quick quick JJ blog-dshr-org-7824 91 27 subsequent subsequent JJ blog-dshr-org-7824 91 28 updates update NNS blog-dshr-org-7824 91 29 to to IN blog-dshr-org-7824 91 30 one one CD blog-dshr-org-7824 91 31 package package NN blog-dshr-org-7824 91 32 . . . blog-dshr-org-7824 92 1 There there EX blog-dshr-org-7824 92 2 may may MD blog-dshr-org-7824 92 3 be be VB blog-dshr-org-7824 92 4 good good JJ blog-dshr-org-7824 92 5 reasons reason NNS blog-dshr-org-7824 92 6 for for IN blog-dshr-org-7824 92 7 releasing release VBG blog-dshr-org-7824 92 8 a a DT blog-dshr-org-7824 92 9 new new JJ blog-dshr-org-7824 92 10 update update NN blog-dshr-org-7824 92 11 shortly shortly RB blog-dshr-org-7824 92 12 after after IN blog-dshr-org-7824 92 13 its -PRON- PRP$ blog-dshr-org-7824 92 14 predecessor predecessor NN blog-dshr-org-7824 92 15 ; ; : blog-dshr-org-7824 92 16 for for IN blog-dshr-org-7824 92 17 example example NN blog-dshr-org-7824 92 18 a a DT blog-dshr-org-7824 92 19 vulnerability vulnerability NN blog-dshr-org-7824 92 20 might may MD blog-dshr-org-7824 92 21 be be VB blog-dshr-org-7824 92 22 discovered discover VBN blog-dshr-org-7824 92 23 in in IN blog-dshr-org-7824 92 24 the the DT blog-dshr-org-7824 92 25 predecessor predecessor NN blog-dshr-org-7824 92 26 shortly shortly RB blog-dshr-org-7824 92 27 after after IN blog-dshr-org-7824 92 28 release release NN blog-dshr-org-7824 92 29 . . . blog-dshr-org-7824 93 1 In in IN blog-dshr-org-7824 93 2 the the DT blog-dshr-org-7824 93 3 hidden hide VBN blog-dshr-org-7824 93 4 version version NN blog-dshr-org-7824 93 5 attack attack NN blog-dshr-org-7824 93 6 , , , blog-dshr-org-7824 93 7 the the DT blog-dshr-org-7824 93 8 attacker attacker NN blog-dshr-org-7824 93 9 increases increase VBZ blog-dshr-org-7824 93 10 a a DT blog-dshr-org-7824 93 11 version version NN blog-dshr-org-7824 93 12 number number NN blog-dshr-org-7824 93 13 in in IN blog-dshr-org-7824 93 14 order order NN blog-dshr-org-7824 93 15 to to TO blog-dshr-org-7824 93 16 get get VB blog-dshr-org-7824 93 17 the the DT blog-dshr-org-7824 93 18 victim victim NN blog-dshr-org-7824 93 19 to to TO blog-dshr-org-7824 93 20 update update VB blog-dshr-org-7824 93 21 a a DT blog-dshr-org-7824 93 22 package package NN blog-dshr-org-7824 93 23 . . . blog-dshr-org-7824 94 1 The the DT blog-dshr-org-7824 94 2 victim victim NN blog-dshr-org-7824 94 3 will will MD blog-dshr-org-7824 94 4 install install VB blog-dshr-org-7824 94 5 this this DT blog-dshr-org-7824 94 6 backdoored backdoore VBN blog-dshr-org-7824 94 7 update update NN blog-dshr-org-7824 94 8 . . . blog-dshr-org-7824 95 1 The the DT blog-dshr-org-7824 95 2 monitor monitor NN blog-dshr-org-7824 95 3 detects detect VBZ blog-dshr-org-7824 95 4 the the DT blog-dshr-org-7824 95 5 hidden hide VBN blog-dshr-org-7824 95 6 version version NN blog-dshr-org-7824 95 7 attack attack NN blog-dshr-org-7824 95 8 due due IN blog-dshr-org-7824 95 9 to to IN blog-dshr-org-7824 95 10 the the DT blog-dshr-org-7824 95 11 irregular irregular JJ blog-dshr-org-7824 95 12 release release NN blog-dshr-org-7824 95 13 file file NN blog-dshr-org-7824 95 14 publication publication NN blog-dshr-org-7824 95 15 . . . blog-dshr-org-7824 96 1 There there EX blog-dshr-org-7824 96 2 are be VBP blog-dshr-org-7824 96 3 now now RB blog-dshr-org-7824 96 4 two two CD blog-dshr-org-7824 96 5 cases case NNS blog-dshr-org-7824 96 6 to to TO blog-dshr-org-7824 96 7 be be VB blog-dshr-org-7824 96 8 considered consider VBN blog-dshr-org-7824 96 9 . . . blog-dshr-org-7824 97 1 The the DT blog-dshr-org-7824 97 2 backdoor backdoor NN blog-dshr-org-7824 97 3 may may MD blog-dshr-org-7824 97 4 be be VB blog-dshr-org-7824 97 5 in in IN blog-dshr-org-7824 97 6 the the DT blog-dshr-org-7824 97 7 binary binary JJ blog-dshr-org-7824 97 8 package package NN blog-dshr-org-7824 97 9 , , , blog-dshr-org-7824 97 10 or or CC blog-dshr-org-7824 97 11 it -PRON- PRP blog-dshr-org-7824 97 12 may may MD blog-dshr-org-7824 97 13 be be VB blog-dshr-org-7824 97 14 in in IN blog-dshr-org-7824 97 15 the the DT blog-dshr-org-7824 97 16 source source NN blog-dshr-org-7824 97 17 package package NN blog-dshr-org-7824 97 18 . . . blog-dshr-org-7824 98 1 The the DT blog-dshr-org-7824 98 2 first first JJ blog-dshr-org-7824 98 3 case case NN blog-dshr-org-7824 98 4 will will MD blog-dshr-org-7824 98 5 be be VB blog-dshr-org-7824 98 6 detected detect VBN blog-dshr-org-7824 98 7 by by IN blog-dshr-org-7824 98 8 monitors monitor NNS blog-dshr-org-7824 98 9 verifying verify VBG blog-dshr-org-7824 98 10 the the DT blog-dshr-org-7824 98 11 reproducible reproducible NN blog-dshr-org-7824 98 12 builds build VBZ blog-dshr-org-7824 98 13 property property NN blog-dshr-org-7824 98 14 . . . blog-dshr-org-7824 99 1 A a DT blog-dshr-org-7824 99 2 monitor monitor NN blog-dshr-org-7824 99 3 can can MD blog-dshr-org-7824 99 4 rebuild rebuild VB blog-dshr-org-7824 99 5 all all DT blog-dshr-org-7824 99 6 changed change VBN blog-dshr-org-7824 99 7 source source NN blog-dshr-org-7824 99 8 packages package NNS blog-dshr-org-7824 99 9 on on IN blog-dshr-org-7824 99 10 every every DT blog-dshr-org-7824 99 11 update update NN blog-dshr-org-7824 99 12 and and CC blog-dshr-org-7824 99 13 check check VB blog-dshr-org-7824 99 14 if if IN blog-dshr-org-7824 99 15 the the DT blog-dshr-org-7824 99 16 resulting result VBG blog-dshr-org-7824 99 17 binary binary JJ blog-dshr-org-7824 99 18 matches match NNS blog-dshr-org-7824 99 19 . . . blog-dshr-org-7824 100 1 If if IN blog-dshr-org-7824 100 2 not not RB blog-dshr-org-7824 100 3 , , , blog-dshr-org-7824 100 4 the the DT blog-dshr-org-7824 100 5 blame blame NN blog-dshr-org-7824 100 6 falls fall VBZ blog-dshr-org-7824 100 7 clearly clearly RB blog-dshr-org-7824 100 8 on on IN blog-dshr-org-7824 100 9 the the DT blog-dshr-org-7824 100 10 archive archive NN blog-dshr-org-7824 100 11 , , , blog-dshr-org-7824 100 12 because because IN blog-dshr-org-7824 100 13 the the DT blog-dshr-org-7824 100 14 source source NN blog-dshr-org-7824 100 15 does do VBZ blog-dshr-org-7824 100 16 not not RB blog-dshr-org-7824 100 17 correspond correspond VB blog-dshr-org-7824 100 18 to to IN blog-dshr-org-7824 100 19 the the DT blog-dshr-org-7824 100 20 binary binary NN blog-dshr-org-7824 100 21 , , , blog-dshr-org-7824 100 22 which which WDT blog-dshr-org-7824 100 23 can can MD blog-dshr-org-7824 100 24 be be VB blog-dshr-org-7824 100 25 demonstrated demonstrate VBN blog-dshr-org-7824 100 26 by by IN blog-dshr-org-7824 100 27 exploiting exploit VBG blog-dshr-org-7824 100 28 reproducible reproducible NN blog-dshr-org-7824 100 29 builds build VBZ blog-dshr-org-7824 100 30 . . . blog-dshr-org-7824 101 1 The the DT blog-dshr-org-7824 101 2 second second JJ blog-dshr-org-7824 101 3 case case NN blog-dshr-org-7824 101 4 requires require VBZ blog-dshr-org-7824 101 5 investigation investigation NN blog-dshr-org-7824 101 6 of of IN blog-dshr-org-7824 101 7 the the DT blog-dshr-org-7824 101 8 packages package NNS blog-dshr-org-7824 101 9 modified modify VBN blog-dshr-org-7824 101 10 by by IN blog-dshr-org-7824 101 11 the the DT blog-dshr-org-7824 101 12 update update NN blog-dshr-org-7824 101 13 . . . blog-dshr-org-7824 102 1 The the DT blog-dshr-org-7824 102 2 source source NN blog-dshr-org-7824 102 3 code code NN blog-dshr-org-7824 102 4 modifications modification NNS blog-dshr-org-7824 102 5 can can MD blog-dshr-org-7824 102 6 be be VB blog-dshr-org-7824 102 7 investigated investigate VBN blog-dshr-org-7824 102 8 for for IN blog-dshr-org-7824 102 9 the the DT blog-dshr-org-7824 102 10 changed change VBN blog-dshr-org-7824 102 11 packages package NNS blog-dshr-org-7824 102 12 , , , blog-dshr-org-7824 102 13 because because IN blog-dshr-org-7824 102 14 all all DT blog-dshr-org-7824 102 15 source source NN blog-dshr-org-7824 102 16 code code NN blog-dshr-org-7824 102 17 is be VBZ blog-dshr-org-7824 102 18 logged log VBN blog-dshr-org-7824 102 19 . . . blog-dshr-org-7824 103 1 The the DT blog-dshr-org-7824 103 2 fact fact NN blog-dshr-org-7824 103 3 that that IN blog-dshr-org-7824 103 4 source source NN blog-dshr-org-7824 103 5 code code NN blog-dshr-org-7824 103 6 can can MD blog-dshr-org-7824 103 7 be be VB blog-dshr-org-7824 103 8 analyzed analyze VBN blog-dshr-org-7824 103 9 , , , blog-dshr-org-7824 103 10 and and CC blog-dshr-org-7824 103 11 no no DT blog-dshr-org-7824 103 12 analysis analysis NN blog-dshr-org-7824 103 13 on on IN blog-dshr-org-7824 103 14 binaries binary NNS blog-dshr-org-7824 103 15 is be VBZ blog-dshr-org-7824 103 16 required require VBN blog-dshr-org-7824 103 17 , , , blog-dshr-org-7824 103 18 makes make VBZ blog-dshr-org-7824 103 19 the the DT blog-dshr-org-7824 103 20 investigation investigation NN blog-dshr-org-7824 103 21 of of IN blog-dshr-org-7824 103 22 the the DT blog-dshr-org-7824 103 23 hidden hide VBN blog-dshr-org-7824 103 24 version version NNP blog-dshr-org-7824 103 25 alert alert NNP blog-dshr-org-7824 103 26 simpler simpler RBR blog-dshr-org-7824 103 27 . . . blog-dshr-org-7824 104 1 The the DT blog-dshr-org-7824 104 2 blame blame NN blog-dshr-org-7824 104 3 for for IN blog-dshr-org-7824 104 4 this this DT blog-dshr-org-7824 104 5 case case NN blog-dshr-org-7824 104 6 falls fall VBZ blog-dshr-org-7824 104 7 on on IN blog-dshr-org-7824 104 8 the the DT blog-dshr-org-7824 104 9 maintainer maintainer NN blog-dshr-org-7824 104 10 , , , blog-dshr-org-7824 104 11 who who WP blog-dshr-org-7824 104 12 can can MD blog-dshr-org-7824 104 13 be be VB blog-dshr-org-7824 104 14 identified identify VBN blog-dshr-org-7824 104 15 by by IN blog-dshr-org-7824 104 16 their -PRON- PRP$ blog-dshr-org-7824 104 17 signature signature NN blog-dshr-org-7824 104 18 on on IN blog-dshr-org-7824 104 19 the the DT blog-dshr-org-7824 104 20 source source NN blog-dshr-org-7824 104 21 package package NN blog-dshr-org-7824 104 22 . . . blog-dshr-org-7824 105 1 If if IN blog-dshr-org-7824 105 2 the the DT blog-dshr-org-7824 105 3 upload upload NN blog-dshr-org-7824 105 4 was be VBD blog-dshr-org-7824 105 5 signed sign VBN blog-dshr-org-7824 105 6 by by IN blog-dshr-org-7824 105 7 a a DT blog-dshr-org-7824 105 8 key key NN blog-dshr-org-7824 105 9 not not RB blog-dshr-org-7824 105 10 in in IN blog-dshr-org-7824 105 11 the the DT blog-dshr-org-7824 105 12 allowed allow VBN blog-dshr-org-7824 105 13 set set NN blog-dshr-org-7824 105 14 , , , blog-dshr-org-7824 105 15 the the DT blog-dshr-org-7824 105 16 blame blame NN blog-dshr-org-7824 105 17 falls fall VBZ blog-dshr-org-7824 105 18 on on IN blog-dshr-org-7824 105 19 the the DT blog-dshr-org-7824 105 20 archive archive NN blog-dshr-org-7824 105 21 for for IN blog-dshr-org-7824 105 22 failing fail VBG blog-dshr-org-7824 105 23 to to TO blog-dshr-org-7824 105 24 authorize authorize VB blog-dshr-org-7824 105 25 correctly correctly RB blog-dshr-org-7824 105 26 . . . blog-dshr-org-7824 106 1 If if IN blog-dshr-org-7824 106 2 the the DT blog-dshr-org-7824 106 3 package package NN blog-dshr-org-7824 106 4 version version NN blog-dshr-org-7824 106 5 numbers number NNS blog-dshr-org-7824 106 6 in in IN blog-dshr-org-7824 106 7 the the DT blog-dshr-org-7824 106 8 meta meta JJ blog-dshr-org-7824 106 9 data datum NNS blog-dshr-org-7824 106 10 are be VBP blog-dshr-org-7824 106 11 inconsistent inconsistent JJ blog-dshr-org-7824 106 12 , , , blog-dshr-org-7824 106 13 this this DT blog-dshr-org-7824 106 14 constitutes constitute VBZ blog-dshr-org-7824 106 15 a a DT blog-dshr-org-7824 106 16 misbehavior misbehavior NN blog-dshr-org-7824 106 17 by by IN blog-dshr-org-7824 106 18 the the DT blog-dshr-org-7824 106 19 submitting submit VBG blog-dshr-org-7824 106 20 archive archive NN blog-dshr-org-7824 106 21 . . . blog-dshr-org-7824 107 1 It -PRON- PRP blog-dshr-org-7824 107 2 can can MD blog-dshr-org-7824 107 3 easily easily RB blog-dshr-org-7824 107 4 be be VB blog-dshr-org-7824 107 5 detected detect VBN blog-dshr-org-7824 107 6 by by IN blog-dshr-org-7824 107 7 a a DT blog-dshr-org-7824 107 8 monitor monitor NN blog-dshr-org-7824 107 9 . . . blog-dshr-org-7824 108 1 Using use VBG blog-dshr-org-7824 108 2 the the DT blog-dshr-org-7824 108 3 release release NN blog-dshr-org-7824 108 4 file file NN blog-dshr-org-7824 108 5 the the DT blog-dshr-org-7824 108 6 monitor monitor NN blog-dshr-org-7824 108 7 can can MD blog-dshr-org-7824 108 8 also also RB blog-dshr-org-7824 108 9 easily easily RB blog-dshr-org-7824 108 10 ensure ensure VB blog-dshr-org-7824 108 11 , , , blog-dshr-org-7824 108 12 by by IN blog-dshr-org-7824 108 13 demanding demand VBG blog-dshr-org-7824 108 14 inclusion inclusion NN blog-dshr-org-7824 108 15 proofs proof NNS blog-dshr-org-7824 108 16 , , , blog-dshr-org-7824 108 17 that that IN blog-dshr-org-7824 108 18 all all DT blog-dshr-org-7824 108 19 required require VBN blog-dshr-org-7824 108 20 files file NNS blog-dshr-org-7824 108 21 have have VBP blog-dshr-org-7824 108 22 been be VBN blog-dshr-org-7824 108 23 logged log VBN blog-dshr-org-7824 108 24 . . . blog-dshr-org-7824 109 1 Note note VB blog-dshr-org-7824 109 2 that that IN blog-dshr-org-7824 109 3 although although IN blog-dshr-org-7824 109 4 their -PRON- PRP$ blog-dshr-org-7824 109 5 system system NN blog-dshr-org-7824 109 6 's 's POS blog-dshr-org-7824 109 7 monitors monitor NNS blog-dshr-org-7824 109 8 detect detect VBP blog-dshr-org-7824 109 9 this this DT blog-dshr-org-7824 109 10 attack attack NN blog-dshr-org-7824 109 11 , , , blog-dshr-org-7824 109 12 and and CC blog-dshr-org-7824 109 13 can can MD blog-dshr-org-7824 109 14 correctly correctly RB blog-dshr-org-7824 109 15 attribute attribute VB blog-dshr-org-7824 109 16 it -PRON- PRP blog-dshr-org-7824 109 17 , , , blog-dshr-org-7824 109 18 they -PRON- PRP blog-dshr-org-7824 109 19 do do VBP blog-dshr-org-7824 109 20 so so RB blog-dshr-org-7824 109 21 asynchronously asynchronously RB blog-dshr-org-7824 109 22 . . . blog-dshr-org-7824 110 1 They -PRON- PRP blog-dshr-org-7824 110 2 do do VBP blog-dshr-org-7824 110 3 not not RB blog-dshr-org-7824 110 4 prevent prevent VB blog-dshr-org-7824 110 5 the the DT blog-dshr-org-7824 110 6 victim victim NN blog-dshr-org-7824 110 7 installing instal VBG blog-dshr-org-7824 110 8 the the DT blog-dshr-org-7824 110 9 backdoored backdoore VBN blog-dshr-org-7824 110 10 update update NN blog-dshr-org-7824 110 11 . . . blog-dshr-org-7824 111 1 The the DT blog-dshr-org-7824 111 2 Split Split NNP blog-dshr-org-7824 111 3 View View NNP blog-dshr-org-7824 111 4 Attack Attack NNP blog-dshr-org-7824 111 5 The the DT blog-dshr-org-7824 111 6 logs log NNS blog-dshr-org-7824 111 7 can can MD blog-dshr-org-7824 111 8 not not RB blog-dshr-org-7824 111 9 be be VB blog-dshr-org-7824 111 10 assumed assume VBN blog-dshr-org-7824 111 11 to to TO blog-dshr-org-7824 111 12 be be VB blog-dshr-org-7824 111 13 above above IN blog-dshr-org-7824 111 14 suspicion suspicion NN blog-dshr-org-7824 111 15 . . . blog-dshr-org-7824 112 1 Hof Hof NNP blog-dshr-org-7824 112 2 and and CC blog-dshr-org-7824 112 3 Carle Carle NNP blog-dshr-org-7824 112 4 describe describe VBP blog-dshr-org-7824 112 5 a a DT blog-dshr-org-7824 112 6 log log NN blog-dshr-org-7824 112 7 - - HYPH blog-dshr-org-7824 112 8 based base VBN blog-dshr-org-7824 112 9 attack attack NN blog-dshr-org-7824 112 10 : : : blog-dshr-org-7824 112 11 The the DT blog-dshr-org-7824 112 12 most most RBS blog-dshr-org-7824 112 13 significant significant JJ blog-dshr-org-7824 112 14 attack attack NN blog-dshr-org-7824 112 15 by by IN blog-dshr-org-7824 112 16 the the DT blog-dshr-org-7824 112 17 log log NN blog-dshr-org-7824 112 18 or or CC blog-dshr-org-7824 112 19 with with IN blog-dshr-org-7824 112 20 the the DT blog-dshr-org-7824 112 21 collusion collusion NN blog-dshr-org-7824 112 22 of of IN blog-dshr-org-7824 112 23 the the DT blog-dshr-org-7824 112 24 log log NN blog-dshr-org-7824 112 25 is be VBZ blog-dshr-org-7824 112 26 equivocation equivocation NN blog-dshr-org-7824 112 27 . . . blog-dshr-org-7824 113 1 In in IN blog-dshr-org-7824 113 2 a a DT blog-dshr-org-7824 113 3 split split NN blog-dshr-org-7824 113 4 - - HYPH blog-dshr-org-7824 113 5 view view NN blog-dshr-org-7824 113 6 or or CC blog-dshr-org-7824 113 7 equivocation equivocation NN blog-dshr-org-7824 113 8 attack attack NN blog-dshr-org-7824 113 9 , , , blog-dshr-org-7824 113 10 a a DT blog-dshr-org-7824 113 11 malicious malicious JJ blog-dshr-org-7824 113 12 log log NN blog-dshr-org-7824 113 13 presents present VBZ blog-dshr-org-7824 113 14 different different JJ blog-dshr-org-7824 113 15 versions version NNS blog-dshr-org-7824 113 16 of of IN blog-dshr-org-7824 113 17 the the DT blog-dshr-org-7824 113 18 Merkle Merkle NNP blog-dshr-org-7824 113 19 tree tree NN blog-dshr-org-7824 113 20 to to IN blog-dshr-org-7824 113 21 the the DT blog-dshr-org-7824 113 22 victim victim NN blog-dshr-org-7824 113 23 and and CC blog-dshr-org-7824 113 24 to to IN blog-dshr-org-7824 113 25 everybody everybody NN blog-dshr-org-7824 113 26 else else RB blog-dshr-org-7824 113 27 . . . blog-dshr-org-7824 114 1 Each each DT blog-dshr-org-7824 114 2 tree tree NN blog-dshr-org-7824 114 3 version version NN blog-dshr-org-7824 114 4 is be VBZ blog-dshr-org-7824 114 5 kept keep VBN blog-dshr-org-7824 114 6 consistent consistent JJ blog-dshr-org-7824 114 7 in in IN blog-dshr-org-7824 114 8 itself -PRON- PRP blog-dshr-org-7824 114 9 . . . blog-dshr-org-7824 115 1 The the DT blog-dshr-org-7824 115 2 tree tree NN blog-dshr-org-7824 115 3 presented present VBD blog-dshr-org-7824 115 4 to to IN blog-dshr-org-7824 115 5 the the DT blog-dshr-org-7824 115 6 victim victim NN blog-dshr-org-7824 115 7 will will MD blog-dshr-org-7824 115 8 include include VB blog-dshr-org-7824 115 9 a a DT blog-dshr-org-7824 115 10 leaf leaf NN blog-dshr-org-7824 115 11 that that WDT blog-dshr-org-7824 115 12 is be VBZ blog-dshr-org-7824 115 13 malicious malicious JJ blog-dshr-org-7824 115 14 in in IN blog-dshr-org-7824 115 15 some some DT blog-dshr-org-7824 115 16 way way NN blog-dshr-org-7824 115 17 , , , blog-dshr-org-7824 115 18 such such JJ blog-dshr-org-7824 115 19 as as IN blog-dshr-org-7824 115 20 an an DT blog-dshr-org-7824 115 21 update update NN blog-dshr-org-7824 115 22 with with IN blog-dshr-org-7824 115 23 a a DT blog-dshr-org-7824 115 24 backdoor backdoor NN blog-dshr-org-7824 115 25 . . . blog-dshr-org-7824 116 1 It -PRON- PRP blog-dshr-org-7824 116 2 might may MD blog-dshr-org-7824 116 3 also also RB blog-dshr-org-7824 116 4 omit omit VB blog-dshr-org-7824 116 5 a a DT blog-dshr-org-7824 116 6 leaf leaf NN blog-dshr-org-7824 116 7 in in IN blog-dshr-org-7824 116 8 order order NN blog-dshr-org-7824 116 9 to to TO blog-dshr-org-7824 116 10 hide hide VB blog-dshr-org-7824 116 11 an an DT blog-dshr-org-7824 116 12 update update NN blog-dshr-org-7824 116 13 . . . blog-dshr-org-7824 117 1 This this DT blog-dshr-org-7824 117 2 is be VBZ blog-dshr-org-7824 117 3 a a DT blog-dshr-org-7824 117 4 powerful powerful JJ blog-dshr-org-7824 117 5 attack attack NN blog-dshr-org-7824 117 6 within within IN blog-dshr-org-7824 117 7 the the DT blog-dshr-org-7824 117 8 threat threat NN blog-dshr-org-7824 117 9 model model NN blog-dshr-org-7824 117 10 that that WDT blog-dshr-org-7824 117 11 violates violate VBZ blog-dshr-org-7824 117 12 the the DT blog-dshr-org-7824 117 13 security security NN blog-dshr-org-7824 117 14 goals goal NNS blog-dshr-org-7824 117 15 and and CC blog-dshr-org-7824 117 16 must must MD blog-dshr-org-7824 117 17 therefore therefore RB blog-dshr-org-7824 117 18 be be VB blog-dshr-org-7824 117 19 defended defend VBN blog-dshr-org-7824 117 20 . . . blog-dshr-org-7824 118 1 A a DT blog-dshr-org-7824 118 2 defense defense NN blog-dshr-org-7824 118 3 against against IN blog-dshr-org-7824 118 4 this this DT blog-dshr-org-7824 118 5 attack attack NN blog-dshr-org-7824 118 6 requires require VBZ blog-dshr-org-7824 118 7 the the DT blog-dshr-org-7824 118 8 client client NN blog-dshr-org-7824 118 9 to to TO blog-dshr-org-7824 118 10 learn learn VB blog-dshr-org-7824 118 11 if if IN blog-dshr-org-7824 118 12 they -PRON- PRP blog-dshr-org-7824 118 13 are be VBP blog-dshr-org-7824 118 14 served serve VBN blog-dshr-org-7824 118 15 from from IN blog-dshr-org-7824 118 16 the the DT blog-dshr-org-7824 118 17 same same JJ blog-dshr-org-7824 118 18 tree tree NN blog-dshr-org-7824 118 19 as as IN blog-dshr-org-7824 118 20 the the DT blog-dshr-org-7824 118 21 others other NNS blog-dshr-org-7824 118 22 . . . blog-dshr-org-7824 119 1 Their -PRON- PRP$ blog-dshr-org-7824 119 2 defense defense NN blog-dshr-org-7824 119 3 requires require VBZ blog-dshr-org-7824 119 4 that that IN blog-dshr-org-7824 119 5 their -PRON- PRP$ blog-dshr-org-7824 119 6 be be VB blog-dshr-org-7824 119 7 multiple multiple JJ blog-dshr-org-7824 119 8 logs log NNS blog-dshr-org-7824 119 9 under under IN blog-dshr-org-7824 119 10 independent independent JJ blog-dshr-org-7824 119 11 administration administration NN blog-dshr-org-7824 119 12 , , , blog-dshr-org-7824 119 13 perhaps perhaps RB blog-dshr-org-7824 119 14 run run VB blog-dshr-org-7824 119 15 by by IN blog-dshr-org-7824 119 16 different different JJ blog-dshr-org-7824 119 17 Linux Linux NNP blog-dshr-org-7824 119 18 distributions distribution NNS blog-dshr-org-7824 119 19 . . . blog-dshr-org-7824 120 1 Each each DT blog-dshr-org-7824 120 2 time time NN blog-dshr-org-7824 120 3 a a DT blog-dshr-org-7824 120 4 " " `` blog-dshr-org-7824 120 5 committing commit VBG blog-dshr-org-7824 120 6 " " '' blog-dshr-org-7824 120 7 log log NN blog-dshr-org-7824 120 8 generated generate VBD blog-dshr-org-7824 120 9 a a DT blog-dshr-org-7824 120 10 new new JJ blog-dshr-org-7824 120 11 tree tree NN blog-dshr-org-7824 120 12 root root NN blog-dshr-org-7824 120 13 containing contain VBG blog-dshr-org-7824 120 14 new new JJ blog-dshr-org-7824 120 15 package package NN blog-dshr-org-7824 120 16 submissions submission NNS blog-dshr-org-7824 120 17 , , , blog-dshr-org-7824 120 18 it -PRON- PRP blog-dshr-org-7824 120 19 would would MD blog-dshr-org-7824 120 20 be be VB blog-dshr-org-7824 120 21 required require VBN blog-dshr-org-7824 120 22 to to TO blog-dshr-org-7824 120 23 submit submit VB blog-dshr-org-7824 120 24 a a DT blog-dshr-org-7824 120 25 signed sign VBN blog-dshr-org-7824 120 26 copy copy NN blog-dshr-org-7824 120 27 of of IN blog-dshr-org-7824 120 28 the the DT blog-dshr-org-7824 120 29 root root NN blog-dshr-org-7824 120 30 to to IN blog-dshr-org-7824 120 31 one one CD blog-dshr-org-7824 120 32 or or CC blog-dshr-org-7824 120 33 more more JJR blog-dshr-org-7824 120 34 " " `` blog-dshr-org-7824 120 35 witness witness NN blog-dshr-org-7824 120 36 " " '' blog-dshr-org-7824 120 37 logs log NNS blog-dshr-org-7824 120 38 under under IN blog-dshr-org-7824 120 39 independent independent JJ blog-dshr-org-7824 120 40 administration administration NN blog-dshr-org-7824 120 41 . . . blog-dshr-org-7824 121 1 The the DT blog-dshr-org-7824 121 2 " " `` blog-dshr-org-7824 121 3 committing commit VBG blog-dshr-org-7824 121 4 " " '' blog-dshr-org-7824 121 5 log log NN blog-dshr-org-7824 121 6 will will MD blog-dshr-org-7824 121 7 obtain obtain VB blog-dshr-org-7824 121 8 commitments commitment NNS blog-dshr-org-7824 121 9 from from IN blog-dshr-org-7824 121 10 the the DT blog-dshr-org-7824 121 11 " " `` blog-dshr-org-7824 121 12 witness witness NN blog-dshr-org-7824 121 13 " " '' blog-dshr-org-7824 121 14 logs log NNS blog-dshr-org-7824 121 15 , , , blog-dshr-org-7824 121 16 and and CC blog-dshr-org-7824 121 17 supply supply VB blog-dshr-org-7824 121 18 them -PRON- PRP blog-dshr-org-7824 121 19 to to IN blog-dshr-org-7824 121 20 clients client NNS blog-dshr-org-7824 121 21 . . . blog-dshr-org-7824 122 1 Clients client NNS blog-dshr-org-7824 122 2 can can MD blog-dshr-org-7824 122 3 then then RB blog-dshr-org-7824 122 4 verify verify VB blog-dshr-org-7824 122 5 that that IN blog-dshr-org-7824 122 6 the the DT blog-dshr-org-7824 122 7 root root NN blog-dshr-org-7824 122 8 they -PRON- PRP blog-dshr-org-7824 122 9 obtain obtain VBP blog-dshr-org-7824 122 10 from from IN blog-dshr-org-7824 122 11 the the DT blog-dshr-org-7824 122 12 " " `` blog-dshr-org-7824 122 13 committing commit VBG blog-dshr-org-7824 122 14 " " '' blog-dshr-org-7824 122 15 log log NN blog-dshr-org-7824 122 16 matches match NNS blog-dshr-org-7824 122 17 that that WDT blog-dshr-org-7824 122 18 obtained obtain VBD blog-dshr-org-7824 122 19 directly directly RB blog-dshr-org-7824 122 20 from from IN blog-dshr-org-7824 122 21 the the DT blog-dshr-org-7824 122 22 " " `` blog-dshr-org-7824 122 23 witness witness NN blog-dshr-org-7824 122 24 " " '' blog-dshr-org-7824 122 25 logs log NNS blog-dshr-org-7824 122 26 : : : blog-dshr-org-7824 122 27 When when WRB blog-dshr-org-7824 122 28 the the DT blog-dshr-org-7824 122 29 client client NN blog-dshr-org-7824 122 30 now now RB blog-dshr-org-7824 122 31 verifies verify VBZ blog-dshr-org-7824 122 32 a a DT blog-dshr-org-7824 122 33 log log NN blog-dshr-org-7824 122 34 entry entry NN blog-dshr-org-7824 122 35 with with IN blog-dshr-org-7824 122 36 the the DT blog-dshr-org-7824 122 37 committing commit VBG blog-dshr-org-7824 122 38 log log NN blog-dshr-org-7824 122 39 , , , blog-dshr-org-7824 122 40 it -PRON- PRP blog-dshr-org-7824 122 41 also also RB blog-dshr-org-7824 122 42 has have VBZ blog-dshr-org-7824 122 43 to to TO blog-dshr-org-7824 122 44 verify verify VB blog-dshr-org-7824 122 45 that that IN blog-dshr-org-7824 122 46 a a DT blog-dshr-org-7824 122 47 tree tree NN blog-dshr-org-7824 122 48 root root NN blog-dshr-org-7824 122 49 covering cover VBG blog-dshr-org-7824 122 50 this this DT blog-dshr-org-7824 122 51 entry entry NN blog-dshr-org-7824 122 52 was be VBD blog-dshr-org-7824 122 53 submitted submit VBN blog-dshr-org-7824 122 54 into into IN blog-dshr-org-7824 122 55 the the DT blog-dshr-org-7824 122 56 witnessing witness VBG blog-dshr-org-7824 122 57 log log NN blog-dshr-org-7824 122 58 . . . blog-dshr-org-7824 123 1 Additionally additionally RB blog-dshr-org-7824 123 2 , , , blog-dshr-org-7824 123 3 the the DT blog-dshr-org-7824 123 4 client client NN blog-dshr-org-7824 123 5 verifies verify VBZ blog-dshr-org-7824 123 6 the the DT blog-dshr-org-7824 123 7 append append NN blog-dshr-org-7824 123 8 - - HYPH blog-dshr-org-7824 123 9 only only RB blog-dshr-org-7824 123 10 property property NN blog-dshr-org-7824 123 11 of of IN blog-dshr-org-7824 123 12 the the DT blog-dshr-org-7824 123 13 witnessing witness VBG blog-dshr-org-7824 123 14 log log NN blog-dshr-org-7824 123 15 . . . blog-dshr-org-7824 124 1 The the DT blog-dshr-org-7824 124 2 witnessing witness VBG blog-dshr-org-7824 124 3 log log NN blog-dshr-org-7824 124 4 introduces introduce VBZ blog-dshr-org-7824 124 5 additional additional JJ blog-dshr-org-7824 124 6 monitoring monitoring NN blog-dshr-org-7824 124 7 requirements requirement NNS blog-dshr-org-7824 124 8 . . . blog-dshr-org-7824 125 1 Next next RB blog-dshr-org-7824 125 2 to to IN blog-dshr-org-7824 125 3 the the DT blog-dshr-org-7824 125 4 usual usual JJ blog-dshr-org-7824 125 5 monitoring monitoring NN blog-dshr-org-7824 125 6 of of IN blog-dshr-org-7824 125 7 the the DT blog-dshr-org-7824 125 8 append append NN blog-dshr-org-7824 125 9 - - HYPH blog-dshr-org-7824 125 10 only only RB blog-dshr-org-7824 125 11 operation operation NN blog-dshr-org-7824 125 12 , , , blog-dshr-org-7824 125 13 we -PRON- PRP blog-dshr-org-7824 125 14 need need VBP blog-dshr-org-7824 125 15 to to TO blog-dshr-org-7824 125 16 check check VB blog-dshr-org-7824 125 17 that that IN blog-dshr-org-7824 125 18 no no DT blog-dshr-org-7824 125 19 equivocating equivocate VBG blog-dshr-org-7824 125 20 tree tree NN blog-dshr-org-7824 125 21 roots root NNS blog-dshr-org-7824 125 22 are be VBP blog-dshr-org-7824 125 23 included include VBN blog-dshr-org-7824 125 24 . . . blog-dshr-org-7824 126 1 To to IN blog-dshr-org-7824 126 2 this this DT blog-dshr-org-7824 126 3 end end NN blog-dshr-org-7824 126 4 , , , blog-dshr-org-7824 126 5 a a DT blog-dshr-org-7824 126 6 monitor monitor NN blog-dshr-org-7824 126 7 follows follow VBZ blog-dshr-org-7824 126 8 all all DT blog-dshr-org-7824 126 9 new new JJ blog-dshr-org-7824 126 10 log log NN blog-dshr-org-7824 126 11 entries entry NNS blog-dshr-org-7824 126 12 of of IN blog-dshr-org-7824 126 13 the the DT blog-dshr-org-7824 126 14 witnessing witness VBG blog-dshr-org-7824 126 15 log log NN blog-dshr-org-7824 126 16 that that WDT blog-dshr-org-7824 126 17 are be VBP blog-dshr-org-7824 126 18 tree tree NN blog-dshr-org-7824 126 19 roots root NNS blog-dshr-org-7824 126 20 of of IN blog-dshr-org-7824 126 21 the the DT blog-dshr-org-7824 126 22 committing commit VBG blog-dshr-org-7824 126 23 log log NN blog-dshr-org-7824 126 24 . . . blog-dshr-org-7824 127 1 The the DT blog-dshr-org-7824 127 2 monitor monitor NN blog-dshr-org-7824 127 3 verifies verify VBZ blog-dshr-org-7824 127 4 that that IN blog-dshr-org-7824 127 5 they -PRON- PRP blog-dshr-org-7824 127 6 are be VBP blog-dshr-org-7824 127 7 all all DT blog-dshr-org-7824 127 8 valid valid JJ blog-dshr-org-7824 127 9 extensions extension NNS blog-dshr-org-7824 127 10 of of IN blog-dshr-org-7824 127 11 the the DT blog-dshr-org-7824 127 12 committing commit VBG blog-dshr-org-7824 127 13 log log NN blog-dshr-org-7824 127 14 's 's POS blog-dshr-org-7824 127 15 tree tree NN blog-dshr-org-7824 127 16 history history NN blog-dshr-org-7824 127 17 . . . blog-dshr-org-7824 128 1 Reproducible Reproducible NNP blog-dshr-org-7824 128 2 Builds Builds NNP blog-dshr-org-7824 128 3 One one CD blog-dshr-org-7824 128 4 weakness weakness NN blog-dshr-org-7824 128 5 in in IN blog-dshr-org-7824 128 6 Hof Hof NNP blog-dshr-org-7824 128 7 and and CC blog-dshr-org-7824 128 8 Carle Carle NNP blog-dshr-org-7824 128 9 's 's POS blog-dshr-org-7824 128 10 actual actual JJ blog-dshr-org-7824 128 11 implementation implementation NN blog-dshr-org-7824 128 12 is be VBZ blog-dshr-org-7824 128 13 in in IN blog-dshr-org-7824 128 14 the the DT blog-dshr-org-7824 128 15 connection connection NN blog-dshr-org-7824 128 16 between between IN blog-dshr-org-7824 128 17 the the DT blog-dshr-org-7824 128 18 signed sign VBN blog-dshr-org-7824 128 19 package package NN blog-dshr-org-7824 128 20 of of IN blog-dshr-org-7824 128 21 source source NN blog-dshr-org-7824 128 22 and and CC blog-dshr-org-7824 128 23 the the DT blog-dshr-org-7824 128 24 hashes hash NNS blog-dshr-org-7824 128 25 of of IN blog-dshr-org-7824 128 26 the the DT blog-dshr-org-7824 128 27 result result NN blog-dshr-org-7824 128 28 of of IN blog-dshr-org-7824 128 29 compiling compile VBG blog-dshr-org-7824 128 30 it -PRON- PRP blog-dshr-org-7824 128 31 . . . blog-dshr-org-7824 129 1 It -PRON- PRP blog-dshr-org-7824 129 2 is be VBZ blog-dshr-org-7824 129 3 in in IN blog-dshr-org-7824 129 4 general general JJ blog-dshr-org-7824 129 5 impossible impossible JJ blog-dshr-org-7824 129 6 to to TO blog-dshr-org-7824 129 7 verify verify VB blog-dshr-org-7824 129 8 that that IN blog-dshr-org-7824 129 9 the the DT blog-dshr-org-7824 129 10 binaries binary NNS blog-dshr-org-7824 129 11 are be VBP blog-dshr-org-7824 129 12 the the DT blog-dshr-org-7824 129 13 result result NN blog-dshr-org-7824 129 14 of of IN blog-dshr-org-7824 129 15 compiling compile VBG blog-dshr-org-7824 129 16 the the DT blog-dshr-org-7824 129 17 source source NN blog-dshr-org-7824 129 18 . . . blog-dshr-org-7824 130 1 In in IN blog-dshr-org-7824 130 2 many many JJ blog-dshr-org-7824 130 3 cases case NNS blog-dshr-org-7824 130 4 , , , blog-dshr-org-7824 130 5 even even RB blog-dshr-org-7824 130 6 if if IN blog-dshr-org-7824 130 7 the the DT blog-dshr-org-7824 130 8 source source NN blog-dshr-org-7824 130 9 is be VBZ blog-dshr-org-7824 130 10 re re VBN blog-dshr-org-7824 130 11 - - VBN blog-dshr-org-7824 130 12 compiled compile VBN blog-dshr-org-7824 130 13 in in IN blog-dshr-org-7824 130 14 the the DT blog-dshr-org-7824 130 15 same same JJ blog-dshr-org-7824 130 16 environment environment NN blog-dshr-org-7824 130 17 the the DT blog-dshr-org-7824 130 18 resulting result VBG blog-dshr-org-7824 130 19 binaries binary NNS blog-dshr-org-7824 130 20 will will MD blog-dshr-org-7824 130 21 not not RB blog-dshr-org-7824 130 22 be be VB blog-dshr-org-7824 130 23 bit bit NN blog-dshr-org-7824 130 24 - - HYPH blog-dshr-org-7824 130 25 for for IN blog-dshr-org-7824 130 26 - - HYPH blog-dshr-org-7824 130 27 bit bit NN blog-dshr-org-7824 130 28 identical identical JJ blog-dshr-org-7824 130 29 , , , blog-dshr-org-7824 130 30 and and CC blog-dshr-org-7824 130 31 thus thus RB blog-dshr-org-7824 130 32 their -PRON- PRP$ blog-dshr-org-7824 130 33 hashes hash NNS blog-dshr-org-7824 130 34 will will MD blog-dshr-org-7824 130 35 differ differ VB blog-dshr-org-7824 130 36 . . . blog-dshr-org-7824 131 1 The the DT blog-dshr-org-7824 131 2 differences difference NNS blog-dshr-org-7824 131 3 have have VBP blog-dshr-org-7824 131 4 many many JJ blog-dshr-org-7824 131 5 causes cause NNS blog-dshr-org-7824 131 6 , , , blog-dshr-org-7824 131 7 including include VBG blog-dshr-org-7824 131 8 timestamps timestamp NNS blog-dshr-org-7824 131 9 , , , blog-dshr-org-7824 131 10 randomized randomized JJ blog-dshr-org-7824 131 11 file file NN blog-dshr-org-7824 131 12 names name NNS blog-dshr-org-7824 131 13 , , , blog-dshr-org-7824 131 14 and and CC blog-dshr-org-7824 131 15 so so RB blog-dshr-org-7824 131 16 on on RB blog-dshr-org-7824 131 17 . . . blog-dshr-org-7824 132 1 Of of RB blog-dshr-org-7824 132 2 course course RB blog-dshr-org-7824 132 3 , , , blog-dshr-org-7824 132 4 changes change NNS blog-dshr-org-7824 132 5 in in IN blog-dshr-org-7824 132 6 the the DT blog-dshr-org-7824 132 7 build build NN blog-dshr-org-7824 132 8 environment environment NN blog-dshr-org-7824 132 9 can can MD blog-dshr-org-7824 132 10 also also RB blog-dshr-org-7824 132 11 introduce introduce VB blog-dshr-org-7824 132 12 differences difference NNS blog-dshr-org-7824 132 13 . . . blog-dshr-org-7824 133 1 To to TO blog-dshr-org-7824 133 2 enable enable VB blog-dshr-org-7824 133 3 binaries binary NNS blog-dshr-org-7824 133 4 to to TO blog-dshr-org-7824 133 5 be be VB blog-dshr-org-7824 133 6 securely securely RB blog-dshr-org-7824 133 7 connected connect VBN blog-dshr-org-7824 133 8 to to IN blog-dshr-org-7824 133 9 their -PRON- PRP$ blog-dshr-org-7824 133 10 source source NN blog-dshr-org-7824 133 11 , , , blog-dshr-org-7824 133 12 a a DT blog-dshr-org-7824 133 13 Reproducible Reproducible NNP blog-dshr-org-7824 133 14 Builds Builds NNP blog-dshr-org-7824 133 15 effort effort NN blog-dshr-org-7824 133 16 has have VBZ blog-dshr-org-7824 133 17 been be VBN blog-dshr-org-7824 133 18 under under IN blog-dshr-org-7824 133 19 way way NN blog-dshr-org-7824 133 20 for for IN blog-dshr-org-7824 133 21 more more JJR blog-dshr-org-7824 133 22 than than IN blog-dshr-org-7824 133 23 5 5 CD blog-dshr-org-7824 133 24 years year NNS blog-dshr-org-7824 133 25 . . . blog-dshr-org-7824 134 1 Debian debian JJ blog-dshr-org-7824 134 2 project project NN blog-dshr-org-7824 134 3 lead lead VBP blog-dshr-org-7824 134 4 Chris Chris NNP blog-dshr-org-7824 134 5 Lamb Lamb NNP blog-dshr-org-7824 134 6 's 's POS blog-dshr-org-7824 134 7 45-minute 45-minute CD blog-dshr-org-7824 134 8 talk talk NN blog-dshr-org-7824 134 9 Think think VBP blog-dshr-org-7824 134 10 you -PRON- PRP blog-dshr-org-7824 134 11 're be VBP blog-dshr-org-7824 134 12 not not RB blog-dshr-org-7824 134 13 a a DT blog-dshr-org-7824 134 14 target target NN blog-dshr-org-7824 134 15 ? ? . blog-dshr-org-7824 135 1 A a DT blog-dshr-org-7824 135 2 tale tale NN blog-dshr-org-7824 135 3 of of IN blog-dshr-org-7824 135 4 3 3 CD blog-dshr-org-7824 135 5 developers developer NNS blog-dshr-org-7824 135 6 ... ... NFP blog-dshr-org-7824 135 7 provides provide VBZ blog-dshr-org-7824 135 8 an an DT blog-dshr-org-7824 135 9 overview overview NN blog-dshr-org-7824 135 10 of of IN blog-dshr-org-7824 135 11 the the DT blog-dshr-org-7824 135 12 problem problem NN blog-dshr-org-7824 135 13 and and CC blog-dshr-org-7824 135 14 the the DT blog-dshr-org-7824 135 15 work work NN blog-dshr-org-7824 135 16 to to TO blog-dshr-org-7824 135 17 solve solve VB blog-dshr-org-7824 135 18 it -PRON- PRP blog-dshr-org-7824 135 19 using use VBG blog-dshr-org-7824 135 20 three three CD blog-dshr-org-7824 135 21 example example NN blog-dshr-org-7824 135 22 compromises compromise NNS blog-dshr-org-7824 135 23 : : : blog-dshr-org-7824 135 24 Alice Alice NNP blog-dshr-org-7824 135 25 , , , blog-dshr-org-7824 135 26 a a DT blog-dshr-org-7824 135 27 package package NN blog-dshr-org-7824 135 28 developer developer NN blog-dshr-org-7824 135 29 who who WP blog-dshr-org-7824 135 30 is be VBZ blog-dshr-org-7824 135 31 blackmailed blackmail VBN blog-dshr-org-7824 135 32 to to TO blog-dshr-org-7824 135 33 distribute distribute VB blog-dshr-org-7824 135 34 binaries binary NNS blog-dshr-org-7824 135 35 that that WDT blog-dshr-org-7824 135 36 do do VBP blog-dshr-org-7824 135 37 n't not RB blog-dshr-org-7824 135 38 match match VB blog-dshr-org-7824 135 39 the the DT blog-dshr-org-7824 135 40 public public JJ blog-dshr-org-7824 135 41 source source NN blog-dshr-org-7824 135 42 . . . blog-dshr-org-7824 136 1 Bob Bob NNP blog-dshr-org-7824 136 2 , , , blog-dshr-org-7824 136 3 a a DT blog-dshr-org-7824 136 4 build build NN blog-dshr-org-7824 136 5 farm farm NN blog-dshr-org-7824 136 6 sysadmin sysadmin NN blog-dshr-org-7824 136 7 whose whose WP$ blog-dshr-org-7824 136 8 personal personal JJ blog-dshr-org-7824 136 9 computer computer NN blog-dshr-org-7824 136 10 has have VBZ blog-dshr-org-7824 136 11 been be VBN blog-dshr-org-7824 136 12 compromised compromise VBN blog-dshr-org-7824 136 13 , , , blog-dshr-org-7824 136 14 leading lead VBG blog-dshr-org-7824 136 15 to to IN blog-dshr-org-7824 136 16 a a DT blog-dshr-org-7824 136 17 compromised compromised JJ blog-dshr-org-7824 136 18 build build NN blog-dshr-org-7824 136 19 toolchain toolchain NN blog-dshr-org-7824 136 20 in in IN blog-dshr-org-7824 136 21 the the DT blog-dshr-org-7824 136 22 build build JJ blog-dshr-org-7824 136 23 farm farm NN blog-dshr-org-7824 136 24 that that WDT blog-dshr-org-7824 136 25 inserts insert VBZ blog-dshr-org-7824 136 26 backdoors backdoor NNS blog-dshr-org-7824 136 27 into into IN blog-dshr-org-7824 136 28 the the DT blog-dshr-org-7824 136 29 binaries binary NNS blog-dshr-org-7824 136 30 . . . blog-dshr-org-7824 137 1 Carol Carol NNP blog-dshr-org-7824 137 2 , , , blog-dshr-org-7824 137 3 a a DT blog-dshr-org-7824 137 4 free free JJ blog-dshr-org-7824 137 5 software software NN blog-dshr-org-7824 137 6 enthusiast enthusiast NN blog-dshr-org-7824 137 7 who who WP blog-dshr-org-7824 137 8 distributes distribute VBZ blog-dshr-org-7824 137 9 binaries binary NNS blog-dshr-org-7824 137 10 to to IN blog-dshr-org-7824 137 11 friends friend NNS blog-dshr-org-7824 137 12 . . . blog-dshr-org-7824 138 1 An an DT blog-dshr-org-7824 138 2 evil evil JJ blog-dshr-org-7824 138 3 maid maid NN blog-dshr-org-7824 138 4 attack attack NN blog-dshr-org-7824 138 5 has have VBZ blog-dshr-org-7824 138 6 compromised compromise VBN blog-dshr-org-7824 138 7 her -PRON- PRP$ blog-dshr-org-7824 138 8 laptop laptop NN blog-dshr-org-7824 138 9 . . . blog-dshr-org-7824 139 1 As as IN blog-dshr-org-7824 139 2 Lamb Lamb NNP blog-dshr-org-7824 139 3 describes describe VBZ blog-dshr-org-7824 139 4 , , , blog-dshr-org-7824 139 5 eliminating eliminate VBG blog-dshr-org-7824 139 6 all all DT blog-dshr-org-7824 139 7 sources source NNS blog-dshr-org-7824 139 8 of of IN blog-dshr-org-7824 139 9 irreproducibility irreproducibility NN blog-dshr-org-7824 139 10 from from IN blog-dshr-org-7824 139 11 a a DT blog-dshr-org-7824 139 12 package package NN blog-dshr-org-7824 139 13 is be VBZ blog-dshr-org-7824 139 14 a a DT blog-dshr-org-7824 139 15 painstaking painstaking JJ blog-dshr-org-7824 139 16 process process NN blog-dshr-org-7824 139 17 because because IN blog-dshr-org-7824 139 18 there there EX blog-dshr-org-7824 139 19 are be VBP blog-dshr-org-7824 139 20 so so RB blog-dshr-org-7824 139 21 many many JJ blog-dshr-org-7824 139 22 possibilities possibility NNS blog-dshr-org-7824 139 23 . . . blog-dshr-org-7824 140 1 They -PRON- PRP blog-dshr-org-7824 140 2 include include VBP blog-dshr-org-7824 140 3 non non JJ blog-dshr-org-7824 140 4 - - JJ blog-dshr-org-7824 140 5 deterministic deterministic JJ blog-dshr-org-7824 140 6 behaviors behavior NNS blog-dshr-org-7824 140 7 such such JJ blog-dshr-org-7824 140 8 as as IN blog-dshr-org-7824 140 9 iterating iterate VBG blog-dshr-org-7824 140 10 over over RP blog-dshr-org-7824 140 11 hashmaps hashmaps RB blog-dshr-org-7824 140 12 , , , blog-dshr-org-7824 140 13 parallel parallel JJ blog-dshr-org-7824 140 14 builds build NNS blog-dshr-org-7824 140 15 , , , blog-dshr-org-7824 140 16 timestamps timestamp NNS blog-dshr-org-7824 140 17 , , , blog-dshr-org-7824 140 18 build build VB blog-dshr-org-7824 140 19 paths path NNS blog-dshr-org-7824 140 20 , , , blog-dshr-org-7824 140 21 file file NN blog-dshr-org-7824 140 22 system system NN blog-dshr-org-7824 140 23 directory directory NN blog-dshr-org-7824 140 24 name name NN blog-dshr-org-7824 140 25 order order NN blog-dshr-org-7824 140 26 , , , blog-dshr-org-7824 140 27 and and CC blog-dshr-org-7824 140 28 so so RB blog-dshr-org-7824 140 29 on on RB blog-dshr-org-7824 140 30 . . . blog-dshr-org-7824 141 1 The the DT blog-dshr-org-7824 141 2 work work NN blog-dshr-org-7824 141 3 started start VBD blog-dshr-org-7824 141 4 in in IN blog-dshr-org-7824 141 5 2013 2013 CD blog-dshr-org-7824 141 6 with with IN blog-dshr-org-7824 141 7 24 24 CD blog-dshr-org-7824 141 8 % % NN blog-dshr-org-7824 141 9 of of IN blog-dshr-org-7824 141 10 Debian debian JJ blog-dshr-org-7824 141 11 packages package NNS blog-dshr-org-7824 141 12 building build VBG blog-dshr-org-7824 141 13 reproducibly reproducibly RB blog-dshr-org-7824 141 14 . . . blog-dshr-org-7824 142 1 Currently currently RB blog-dshr-org-7824 142 2 , , , blog-dshr-org-7824 142 3 over over IN blog-dshr-org-7824 142 4 90 90 CD blog-dshr-org-7824 142 5 % % NN blog-dshr-org-7824 142 6 of of IN blog-dshr-org-7824 142 7 the the DT blog-dshr-org-7824 142 8 Debian debian JJ blog-dshr-org-7824 142 9 packages package NNS blog-dshr-org-7824 142 10 are be VBP blog-dshr-org-7824 142 11 now now RB blog-dshr-org-7824 142 12 reproducible reproducible JJ blog-dshr-org-7824 142 13 . . . blog-dshr-org-7824 143 1 That that DT blog-dshr-org-7824 143 2 is be VBZ blog-dshr-org-7824 143 3 good good JJ blog-dshr-org-7824 143 4 , , , blog-dshr-org-7824 143 5 but but CC blog-dshr-org-7824 143 6 100 100 CD blog-dshr-org-7824 143 7 % % NN blog-dshr-org-7824 143 8 coverage coverage NN blog-dshr-org-7824 143 9 is be VBZ blog-dshr-org-7824 143 10 really really RB blog-dshr-org-7824 143 11 necessary necessary JJ blog-dshr-org-7824 143 12 to to TO blog-dshr-org-7824 143 13 provide provide VB blog-dshr-org-7824 143 14 security security NN blog-dshr-org-7824 143 15 . . . blog-dshr-org-7824 144 1 Bootstrappable Bootstrappable NNP blog-dshr-org-7824 144 2 Compilers Compilers NNP blog-dshr-org-7824 144 3 One one CD blog-dshr-org-7824 144 4 of of IN blog-dshr-org-7824 144 5 the the DT blog-dshr-org-7824 144 6 most most RBS blog-dshr-org-7824 144 7 famous famous JJ blog-dshr-org-7824 144 8 of of IN blog-dshr-org-7824 144 9 the the DT blog-dshr-org-7824 144 10 ACM ACM NNP blog-dshr-org-7824 144 11 's 's POS blog-dshr-org-7824 144 12 annual annual JJ blog-dshr-org-7824 144 13 Turing Turing NNP blog-dshr-org-7824 144 14 Award Award NNP blog-dshr-org-7824 144 15 lectures lecture NNS blog-dshr-org-7824 144 16 was be VBD blog-dshr-org-7824 144 17 Ken Ken NNP blog-dshr-org-7824 144 18 Thompson Thompson NNP blog-dshr-org-7824 144 19 's 's POS blog-dshr-org-7824 144 20 1984 1984 CD blog-dshr-org-7824 144 21 Reflections Reflections NNPS blog-dshr-org-7824 144 22 On on IN blog-dshr-org-7824 144 23 Trusting Trusting NNP blog-dshr-org-7824 144 24 Trust Trust NNP blog-dshr-org-7824 144 25 ( ( -LRB- blog-dshr-org-7824 144 26 also also RB blog-dshr-org-7824 144 27 here here RB blog-dshr-org-7824 144 28 ) ) -RRB- blog-dshr-org-7824 144 29 . . . blog-dshr-org-7824 145 1 In in IN blog-dshr-org-7824 145 2 2006 2006 CD blog-dshr-org-7824 145 3 , , , blog-dshr-org-7824 145 4 Bruce Bruce NNP blog-dshr-org-7824 145 5 Schneier Schneier NNP blog-dshr-org-7824 145 6 summarized summarize VBD blog-dshr-org-7824 145 7 its -PRON- PRP$ blog-dshr-org-7824 145 8 message message NN blog-dshr-org-7824 145 9 thus thus RB blog-dshr-org-7824 145 10 : : : blog-dshr-org-7824 145 11 Way way NN blog-dshr-org-7824 145 12 back back RB blog-dshr-org-7824 145 13 in in IN blog-dshr-org-7824 145 14 1974 1974 CD blog-dshr-org-7824 145 15 , , , blog-dshr-org-7824 145 16 Paul Paul NNP blog-dshr-org-7824 145 17 Karger Karger NNP blog-dshr-org-7824 145 18 and and CC blog-dshr-org-7824 145 19 Roger Roger NNP blog-dshr-org-7824 145 20 Schell Schell NNP blog-dshr-org-7824 145 21 discovered discover VBD blog-dshr-org-7824 145 22 a a DT blog-dshr-org-7824 145 23 devastating devastating JJ blog-dshr-org-7824 145 24 attack attack NN blog-dshr-org-7824 145 25 against against IN blog-dshr-org-7824 145 26 computer computer NN blog-dshr-org-7824 145 27 systems system NNS blog-dshr-org-7824 145 28 . . . blog-dshr-org-7824 146 1 Ken Ken NNP blog-dshr-org-7824 146 2 Thompson Thompson NNP blog-dshr-org-7824 146 3 described describe VBD blog-dshr-org-7824 146 4 it -PRON- PRP blog-dshr-org-7824 146 5 in in IN blog-dshr-org-7824 146 6 his -PRON- PRP$ blog-dshr-org-7824 146 7 classic classic JJ blog-dshr-org-7824 146 8 1984 1984 CD blog-dshr-org-7824 146 9 speech speech NN blog-dshr-org-7824 146 10 , , , blog-dshr-org-7824 146 11 " " `` blog-dshr-org-7824 146 12 Reflections reflection NNS blog-dshr-org-7824 146 13 on on IN blog-dshr-org-7824 146 14 Trusting Trusting NNP blog-dshr-org-7824 146 15 Trust Trust NNP blog-dshr-org-7824 146 16 . . . blog-dshr-org-7824 146 17 " " '' blog-dshr-org-7824 147 1 Basically basically RB blog-dshr-org-7824 147 2 , , , blog-dshr-org-7824 147 3 an an DT blog-dshr-org-7824 147 4 attacker attacker NN blog-dshr-org-7824 147 5 changes change VBZ blog-dshr-org-7824 147 6 a a DT blog-dshr-org-7824 147 7 compiler compiler NN blog-dshr-org-7824 147 8 binary binary JJ blog-dshr-org-7824 147 9 to to TO blog-dshr-org-7824 147 10 produce produce VB blog-dshr-org-7824 147 11 malicious malicious JJ blog-dshr-org-7824 147 12 versions version NNS blog-dshr-org-7824 147 13 of of IN blog-dshr-org-7824 147 14 some some DT blog-dshr-org-7824 147 15 programs program NNS blog-dshr-org-7824 147 16 , , , blog-dshr-org-7824 147 17 INCLUDING including RB blog-dshr-org-7824 147 18 ITSELF ITSELF NNP blog-dshr-org-7824 147 19 . . . blog-dshr-org-7824 148 1 Once once IN blog-dshr-org-7824 148 2 this this DT blog-dshr-org-7824 148 3 is be VBZ blog-dshr-org-7824 148 4 done do VBN blog-dshr-org-7824 148 5 , , , blog-dshr-org-7824 148 6 the the DT blog-dshr-org-7824 148 7 attack attack NN blog-dshr-org-7824 148 8 perpetuates perpetuate NNS blog-dshr-org-7824 148 9 , , , blog-dshr-org-7824 148 10 essentially essentially RB blog-dshr-org-7824 148 11 undetectably undetectably RB blog-dshr-org-7824 148 12 . . . blog-dshr-org-7824 149 1 Thompson Thompson NNP blog-dshr-org-7824 149 2 demonstrated demonstrate VBD blog-dshr-org-7824 149 3 the the DT blog-dshr-org-7824 149 4 attack attack NN blog-dshr-org-7824 149 5 in in IN blog-dshr-org-7824 149 6 a a DT blog-dshr-org-7824 149 7 devastating devastating JJ blog-dshr-org-7824 149 8 way way NN blog-dshr-org-7824 149 9 : : : blog-dshr-org-7824 149 10 he -PRON- PRP blog-dshr-org-7824 149 11 subverted subvert VBD blog-dshr-org-7824 149 12 a a DT blog-dshr-org-7824 149 13 compiler compiler NN blog-dshr-org-7824 149 14 of of IN blog-dshr-org-7824 149 15 an an DT blog-dshr-org-7824 149 16 experimental experimental JJ blog-dshr-org-7824 149 17 victim victim NN blog-dshr-org-7824 149 18 , , , blog-dshr-org-7824 149 19 allowing allow VBG blog-dshr-org-7824 149 20 Thompson Thompson NNP blog-dshr-org-7824 149 21 to to TO blog-dshr-org-7824 149 22 log log VB blog-dshr-org-7824 149 23 in in RP blog-dshr-org-7824 149 24 as as IN blog-dshr-org-7824 149 25 root root NN blog-dshr-org-7824 149 26 without without IN blog-dshr-org-7824 149 27 using use VBG blog-dshr-org-7824 149 28 a a DT blog-dshr-org-7824 149 29 password password NN blog-dshr-org-7824 149 30 . . . blog-dshr-org-7824 150 1 The the DT blog-dshr-org-7824 150 2 victim victim NN blog-dshr-org-7824 150 3 never never RB blog-dshr-org-7824 150 4 noticed notice VBD blog-dshr-org-7824 150 5 the the DT blog-dshr-org-7824 150 6 attack attack NN blog-dshr-org-7824 150 7 , , , blog-dshr-org-7824 150 8 even even RB blog-dshr-org-7824 150 9 when when WRB blog-dshr-org-7824 150 10 they -PRON- PRP blog-dshr-org-7824 150 11 disassembled disassemble VBD blog-dshr-org-7824 150 12 the the DT blog-dshr-org-7824 150 13 binaries binary NNS blog-dshr-org-7824 150 14 -- -- : blog-dshr-org-7824 150 15 the the DT blog-dshr-org-7824 150 16 compiler compiler NN blog-dshr-org-7824 150 17 rigged rig VBD blog-dshr-org-7824 150 18 the the DT blog-dshr-org-7824 150 19 disassembler disassembler NN blog-dshr-org-7824 150 20 , , , blog-dshr-org-7824 150 21 too too RB blog-dshr-org-7824 150 22 . . . blog-dshr-org-7824 151 1 Schneier Schneier NNP blog-dshr-org-7824 151 2 was be VBD blog-dshr-org-7824 151 3 discussing discuss VBG blog-dshr-org-7824 151 4 David David NNP blog-dshr-org-7824 151 5 A. A. NNP blog-dshr-org-7824 151 6 Wheeler Wheeler NNP blog-dshr-org-7824 151 7 's 's POS blog-dshr-org-7824 151 8 Countering Countering NNP blog-dshr-org-7824 151 9 Trusting Trusting NNP blog-dshr-org-7824 151 10 Trust Trust NNP blog-dshr-org-7824 151 11 through through IN blog-dshr-org-7824 151 12 Diverse Diverse NNP blog-dshr-org-7824 151 13 Double double NN blog-dshr-org-7824 151 14 - - HYPH blog-dshr-org-7824 151 15 Compiling compiling JJ blog-dshr-org-7824 151 16 . . . blog-dshr-org-7824 152 1 Wheeler Wheeler NNP blog-dshr-org-7824 152 2 's 's POS blog-dshr-org-7824 152 3 subsequent subsequent JJ blog-dshr-org-7824 152 4 work work NN blog-dshr-org-7824 152 5 led lead VBD blog-dshr-org-7824 152 6 to to IN blog-dshr-org-7824 152 7 his -PRON- PRP$ blog-dshr-org-7824 152 8 2009 2009 CD blog-dshr-org-7824 152 9 Ph.D. ph.d. NN blog-dshr-org-7824 152 10 thesis thesis NN blog-dshr-org-7824 152 11 . . . blog-dshr-org-7824 153 1 To to TO blog-dshr-org-7824 153 2 oversimpify oversimpify VB blog-dshr-org-7824 153 3 , , , blog-dshr-org-7824 153 4 his -PRON- PRP$ blog-dshr-org-7824 153 5 technique technique NN blog-dshr-org-7824 153 6 involves involve VBZ blog-dshr-org-7824 153 7 the the DT blog-dshr-org-7824 153 8 suspect suspect JJ blog-dshr-org-7824 153 9 compiler compiler NN blog-dshr-org-7824 153 10 compiling compile VBG blog-dshr-org-7824 153 11 its -PRON- PRP$ blog-dshr-org-7824 153 12 source source NN blog-dshr-org-7824 153 13 twice twice RB blog-dshr-org-7824 153 14 , , , blog-dshr-org-7824 153 15 and and CC blog-dshr-org-7824 153 16 comparing compare VBG blog-dshr-org-7824 153 17 the the DT blog-dshr-org-7824 153 18 output output NN blog-dshr-org-7824 153 19 to to IN blog-dshr-org-7824 153 20 that that DT blog-dshr-org-7824 153 21 from from IN blog-dshr-org-7824 153 22 a a DT blog-dshr-org-7824 153 23 " " `` blog-dshr-org-7824 153 24 trusted trusted JJ blog-dshr-org-7824 153 25 " " '' blog-dshr-org-7824 153 26 compiler compiler NN blog-dshr-org-7824 153 27 compiling compile VBG blog-dshr-org-7824 153 28 the the DT blog-dshr-org-7824 153 29 same same JJ blog-dshr-org-7824 153 30 source source NN blog-dshr-org-7824 153 31 twice twice RB blog-dshr-org-7824 153 32 . . . blog-dshr-org-7824 154 1 He -PRON- PRP blog-dshr-org-7824 154 2 writes write VBZ blog-dshr-org-7824 154 3 : : : blog-dshr-org-7824 154 4 DDC DDC NNP blog-dshr-org-7824 154 5 uses use VBZ blog-dshr-org-7824 154 6 a a DT blog-dshr-org-7824 154 7 second second JJ blog-dshr-org-7824 154 8 “ " `` blog-dshr-org-7824 154 9 trusted trusted JJ blog-dshr-org-7824 154 10 ” " '' blog-dshr-org-7824 154 11 compiler compiler NN blog-dshr-org-7824 154 12 cT cT NNP blog-dshr-org-7824 154 13 , , , blog-dshr-org-7824 154 14 which which WDT blog-dshr-org-7824 154 15 is be VBZ blog-dshr-org-7824 154 16 trusted trust VBN blog-dshr-org-7824 154 17 in in IN blog-dshr-org-7824 154 18 the the DT blog-dshr-org-7824 154 19 sense sense NN blog-dshr-org-7824 154 20 that that IN blog-dshr-org-7824 154 21 we -PRON- PRP blog-dshr-org-7824 154 22 have have VBP blog-dshr-org-7824 154 23 a a DT blog-dshr-org-7824 154 24 justified justified JJ blog-dshr-org-7824 154 25 confidence confidence NN blog-dshr-org-7824 154 26 that that IN blog-dshr-org-7824 154 27 cT cT NNP blog-dshr-org-7824 154 28 does do VBZ blog-dshr-org-7824 154 29 not not RB blog-dshr-org-7824 154 30 have have VB blog-dshr-org-7824 154 31 triggers trigger NNS blog-dshr-org-7824 154 32 or or CC blog-dshr-org-7824 154 33 payloads payload NNS blog-dshr-org-7824 154 34 There there EX blog-dshr-org-7824 154 35 are be VBP blog-dshr-org-7824 154 36 two two CD blog-dshr-org-7824 154 37 issues issue NNS blog-dshr-org-7824 154 38 here here RB blog-dshr-org-7824 154 39 . . . blog-dshr-org-7824 155 1 The the DT blog-dshr-org-7824 155 2 first first JJ blog-dshr-org-7824 155 3 is be VBZ blog-dshr-org-7824 155 4 an an DT blog-dshr-org-7824 155 5 assumption assumption NN blog-dshr-org-7824 155 6 that that IN blog-dshr-org-7824 155 7 the the DT blog-dshr-org-7824 155 8 suspect suspect JJ blog-dshr-org-7824 155 9 compiler compiler NN blog-dshr-org-7824 155 10 's 's POS blog-dshr-org-7824 155 11 build build NN blog-dshr-org-7824 155 12 is be VBZ blog-dshr-org-7824 155 13 reproducible reproducible JJ blog-dshr-org-7824 155 14 . . . blog-dshr-org-7824 156 1 The the DT blog-dshr-org-7824 156 2 second second JJ blog-dshr-org-7824 156 3 is be VBZ blog-dshr-org-7824 156 4 the the DT blog-dshr-org-7824 156 5 issue issue NN blog-dshr-org-7824 156 6 of of IN blog-dshr-org-7824 156 7 where where WRB blog-dshr-org-7824 156 8 the the DT blog-dshr-org-7824 156 9 " " `` blog-dshr-org-7824 156 10 justified justified JJ blog-dshr-org-7824 156 11 confidence confidence NN blog-dshr-org-7824 156 12 " " '' blog-dshr-org-7824 156 13 comes come VBZ blog-dshr-org-7824 156 14 from from IN blog-dshr-org-7824 156 15 . . . blog-dshr-org-7824 157 1 This this DT blog-dshr-org-7824 157 2 is be VBZ blog-dshr-org-7824 157 3 the the DT blog-dshr-org-7824 157 4 motivation motivation NN blog-dshr-org-7824 157 5 for for IN blog-dshr-org-7824 157 6 the the DT blog-dshr-org-7824 157 7 Bootstrappable Bootstrappable NNP blog-dshr-org-7824 157 8 Builds Builds NNPS blog-dshr-org-7824 157 9 project project NN blog-dshr-org-7824 157 10 , , , blog-dshr-org-7824 157 11 whose whose WP$ blog-dshr-org-7824 157 12 goal goal NN blog-dshr-org-7824 157 13 is be VBZ blog-dshr-org-7824 157 14 to to TO blog-dshr-org-7824 157 15 create create VB blog-dshr-org-7824 157 16 a a DT blog-dshr-org-7824 157 17 process process NN blog-dshr-org-7824 157 18 for for IN blog-dshr-org-7824 157 19 building build VBG blog-dshr-org-7824 157 20 a a DT blog-dshr-org-7824 157 21 complete complete JJ blog-dshr-org-7824 157 22 toolchain toolchain NN blog-dshr-org-7824 157 23 starting start VBG blog-dshr-org-7824 157 24 from from IN blog-dshr-org-7824 157 25 a a DT blog-dshr-org-7824 157 26 " " `` blog-dshr-org-7824 157 27 seed seed NN blog-dshr-org-7824 157 28 " " '' blog-dshr-org-7824 157 29 binary binary NN blog-dshr-org-7824 157 30 that that WDT blog-dshr-org-7824 157 31 is be VBZ blog-dshr-org-7824 157 32 simple simple JJ blog-dshr-org-7824 157 33 enough enough RB blog-dshr-org-7824 157 34 to to TO blog-dshr-org-7824 157 35 be be VB blog-dshr-org-7824 157 36 certified certify VBN blog-dshr-org-7824 157 37 " " '' blog-dshr-org-7824 157 38 by by IN blog-dshr-org-7824 157 39 inspection inspection NN blog-dshr-org-7824 157 40 " " '' blog-dshr-org-7824 157 41 . . . blog-dshr-org-7824 158 1 One one CD blog-dshr-org-7824 158 2 sub sub NN blog-dshr-org-7824 158 3 - - HYPH blog-dshr-org-7824 158 4 project project NN blog-dshr-org-7824 158 5 is be VBZ blog-dshr-org-7824 158 6 Stage0 stage0 JJ blog-dshr-org-7824 158 7 : : : blog-dshr-org-7824 158 8 Stage0 stage0 VB blog-dshr-org-7824 158 9 starts start VBZ blog-dshr-org-7824 158 10 with with IN blog-dshr-org-7824 158 11 just just RB blog-dshr-org-7824 158 12 a a DT blog-dshr-org-7824 158 13 280byte 280byte NNP blog-dshr-org-7824 158 14 Hex Hex NNP blog-dshr-org-7824 158 15 monitor monitor NN blog-dshr-org-7824 158 16 and and CC blog-dshr-org-7824 158 17 builds build VBZ blog-dshr-org-7824 158 18 up up RP blog-dshr-org-7824 158 19 the the DT blog-dshr-org-7824 158 20 infrastructure infrastructure NN blog-dshr-org-7824 158 21 required require VBN blog-dshr-org-7824 158 22 to to TO blog-dshr-org-7824 158 23 start start VB blog-dshr-org-7824 158 24 some some DT blog-dshr-org-7824 158 25 serious serious JJ blog-dshr-org-7824 158 26 software software NN blog-dshr-org-7824 158 27 development development NN blog-dshr-org-7824 158 28 . . . blog-dshr-org-7824 159 1 With with IN blog-dshr-org-7824 159 2 zero zero CD blog-dshr-org-7824 159 3 external external JJ blog-dshr-org-7824 159 4 dependencies dependency NNS blog-dshr-org-7824 159 5 , , , blog-dshr-org-7824 159 6 with with IN blog-dshr-org-7824 159 7 the the DT blog-dshr-org-7824 159 8 most most RBS blog-dshr-org-7824 159 9 painful painful JJ blog-dshr-org-7824 159 10 work work NN blog-dshr-org-7824 159 11 already already RB blog-dshr-org-7824 159 12 done do VBN blog-dshr-org-7824 159 13 and and CC blog-dshr-org-7824 159 14 real real JJ blog-dshr-org-7824 159 15 langauges langauge NNS blog-dshr-org-7824 159 16 such such JJ blog-dshr-org-7824 159 17 as as IN blog-dshr-org-7824 159 18 assembly assembly NN blog-dshr-org-7824 159 19 , , , blog-dshr-org-7824 159 20 forth forth RB blog-dshr-org-7824 159 21 and and CC blog-dshr-org-7824 159 22 garbage garbage NN blog-dshr-org-7824 159 23 collected collect VBN blog-dshr-org-7824 159 24 lisp lisp NNS blog-dshr-org-7824 159 25 already already RB blog-dshr-org-7824 159 26 implemented implement VBD blog-dshr-org-7824 159 27 The the DT blog-dshr-org-7824 159 28 current current JJ blog-dshr-org-7824 159 29 0.2.0 0.2.0 NN blog-dshr-org-7824 159 30 release release NN blog-dshr-org-7824 159 31 of of IN blog-dshr-org-7824 159 32 Stage0 Stage0 NNP blog-dshr-org-7824 159 33 : : : blog-dshr-org-7824 159 34 marks mark NNS blog-dshr-org-7824 159 35 the the DT blog-dshr-org-7824 159 36 first first JJ blog-dshr-org-7824 159 37 C C NNP blog-dshr-org-7824 159 38 compiler compiler NN blog-dshr-org-7824 159 39 hand hand NN blog-dshr-org-7824 159 40 written write VBN blog-dshr-org-7824 159 41 in in IN blog-dshr-org-7824 159 42 Assembly Assembly NNP blog-dshr-org-7824 159 43 with with IN blog-dshr-org-7824 159 44 structs struct NNS blog-dshr-org-7824 159 45 , , , blog-dshr-org-7824 159 46 unions union NNS blog-dshr-org-7824 159 47 , , , blog-dshr-org-7824 159 48 inline inline NNP blog-dshr-org-7824 159 49 assembly assembly NN blog-dshr-org-7824 159 50 and and CC blog-dshr-org-7824 159 51 the the DT blog-dshr-org-7824 159 52 ability ability NN blog-dshr-org-7824 159 53 to to TO blog-dshr-org-7824 159 54 self self NN blog-dshr-org-7824 159 55 - - HYPH blog-dshr-org-7824 159 56 host host NN blog-dshr-org-7824 159 57 it -PRON- PRP blog-dshr-org-7824 159 58 's be VBZ blog-dshr-org-7824 159 59 C C NNP blog-dshr-org-7824 159 60 version version NN blog-dshr-org-7824 159 61 , , , blog-dshr-org-7824 159 62 which which WDT blog-dshr-org-7824 159 63 is be VBZ blog-dshr-org-7824 159 64 also also RB blog-dshr-org-7824 159 65 self self NN blog-dshr-org-7824 159 66 - - HYPH blog-dshr-org-7824 159 67 hosting host VBG blog-dshr-org-7824 159 68 There there EX blog-dshr-org-7824 159 69 is be VBZ blog-dshr-org-7824 159 70 clearly clearly RB blog-dshr-org-7824 159 71 a a DT blog-dshr-org-7824 159 72 long long JJ blog-dshr-org-7824 159 73 way way NN blog-dshr-org-7824 159 74 still still RB blog-dshr-org-7824 159 75 to to TO blog-dshr-org-7824 159 76 go go VB blog-dshr-org-7824 159 77 to to IN blog-dshr-org-7824 159 78 a a DT blog-dshr-org-7824 159 79 bootstrapped bootstrappe VBN blog-dshr-org-7824 159 80 full full JJ blog-dshr-org-7824 159 81 toolchain toolchain NN blog-dshr-org-7824 159 82 . . . blog-dshr-org-7824 160 1 A a DT blog-dshr-org-7824 160 2 More more RBR blog-dshr-org-7824 160 3 Secure secure JJ blog-dshr-org-7824 160 4 Software software NN blog-dshr-org-7824 160 5 Supply supply NN blog-dshr-org-7824 160 6 Chain chain NN blog-dshr-org-7824 160 7 A a DT blog-dshr-org-7824 160 8 software software NN blog-dshr-org-7824 160 9 supply supply NN blog-dshr-org-7824 160 10 chain chain NN blog-dshr-org-7824 160 11 based base VBN blog-dshr-org-7824 160 12 on on IN blog-dshr-org-7824 160 13 APT APT NNP blog-dshr-org-7824 160 14 enhanced enhance VBN blog-dshr-org-7824 160 15 with with IN blog-dshr-org-7824 160 16 Hof Hof NNP blog-dshr-org-7824 160 17 and and CC blog-dshr-org-7824 160 18 Carle Carle NNP blog-dshr-org-7824 160 19 's 's POS blog-dshr-org-7824 160 20 transparency transparency NN blog-dshr-org-7824 160 21 layer layer NN blog-dshr-org-7824 160 22 , , , blog-dshr-org-7824 160 23 distributing distribute VBG blog-dshr-org-7824 160 24 packages package NNS blog-dshr-org-7824 160 25 reproducibly reproducibly RB blog-dshr-org-7824 160 26 built build VBN blog-dshr-org-7824 160 27 with with IN blog-dshr-org-7824 160 28 bootstrapped bootstrappe VBN blog-dshr-org-7824 160 29 compilers compiler NNS blog-dshr-org-7824 160 30 , , , blog-dshr-org-7824 160 31 would would MD blog-dshr-org-7824 160 32 be be VB blog-dshr-org-7824 160 33 much much RB blog-dshr-org-7824 160 34 more more RBR blog-dshr-org-7824 160 35 difficult difficult JJ blog-dshr-org-7824 160 36 to to TO blog-dshr-org-7824 160 37 attack attack VB blog-dshr-org-7824 160 38 than than IN blog-dshr-org-7824 160 39 current current JJ blog-dshr-org-7824 160 40 technology technology NN blog-dshr-org-7824 160 41 . . . blog-dshr-org-7824 161 1 Users user NNS blog-dshr-org-7824 161 2 of of IN blog-dshr-org-7824 161 3 the the DT blog-dshr-org-7824 161 4 software software NN blog-dshr-org-7824 161 5 could could MD blog-dshr-org-7824 161 6 have have VB blog-dshr-org-7824 161 7 much much RB blog-dshr-org-7824 161 8 higher high JJR blog-dshr-org-7824 161 9 confidence confidence NN blog-dshr-org-7824 161 10 that that IN blog-dshr-org-7824 161 11 the the DT blog-dshr-org-7824 161 12 binaries binary NNS blog-dshr-org-7824 161 13 they -PRON- PRP blog-dshr-org-7824 161 14 installed instal VBD blog-dshr-org-7824 161 15 had have VBD blog-dshr-org-7824 161 16 been be VBN blog-dshr-org-7824 161 17 built build VBN blog-dshr-org-7824 161 18 from from IN blog-dshr-org-7824 161 19 the the DT blog-dshr-org-7824 161 20 corresponding corresponding JJ blog-dshr-org-7824 161 21 source source NN blog-dshr-org-7824 161 22 , , , blog-dshr-org-7824 161 23 and and CC blog-dshr-org-7824 161 24 that that IN blog-dshr-org-7824 161 25 no no DT blog-dshr-org-7824 161 26 attacker attacker NN blog-dshr-org-7824 161 27 had have VBD blog-dshr-org-7824 161 28 introduced introduce VBN blog-dshr-org-7824 161 29 functionality functionality NN blog-dshr-org-7824 161 30 not not RB blog-dshr-org-7824 161 31 evident evident JJ blog-dshr-org-7824 161 32 in in IN blog-dshr-org-7824 161 33 the the DT blog-dshr-org-7824 161 34 source source NN blog-dshr-org-7824 161 35 . . . blog-dshr-org-7824 162 1 These these DT blog-dshr-org-7824 162 2 checks check NNS blog-dshr-org-7824 162 3 would would MD blog-dshr-org-7824 162 4 take take VB blog-dshr-org-7824 162 5 place place NN blog-dshr-org-7824 162 6 during during IN blog-dshr-org-7824 162 7 software software NN blog-dshr-org-7824 162 8 installation installation NN blog-dshr-org-7824 162 9 or or CC blog-dshr-org-7824 162 10 update update NN blog-dshr-org-7824 162 11 . . . blog-dshr-org-7824 163 1 Users user NNS blog-dshr-org-7824 163 2 would would MD blog-dshr-org-7824 163 3 still still RB blog-dshr-org-7824 163 4 need need VB blog-dshr-org-7824 163 5 to to TO blog-dshr-org-7824 163 6 verify verify VB blog-dshr-org-7824 163 7 that that IN blog-dshr-org-7824 163 8 the the DT blog-dshr-org-7824 163 9 software software NN blog-dshr-org-7824 163 10 had have VBD blog-dshr-org-7824 163 11 not not RB blog-dshr-org-7824 163 12 been be VBN blog-dshr-org-7824 163 13 modified modify VBN blog-dshr-org-7824 163 14 after after IN blog-dshr-org-7824 163 15 installation installation NN blog-dshr-org-7824 163 16 , , , blog-dshr-org-7824 163 17 perhaps perhaps RB blog-dshr-org-7824 163 18 using use VBG blog-dshr-org-7824 163 19 a a DT blog-dshr-org-7824 163 20 tripwire tripwire NN blog-dshr-org-7824 163 21 - - HYPH blog-dshr-org-7824 163 22 like like JJ blog-dshr-org-7824 163 23 mechanism mechanism NN blog-dshr-org-7824 163 24 , , , blog-dshr-org-7824 163 25 But but CC blog-dshr-org-7824 163 26 this this DT blog-dshr-org-7824 163 27 mechanism mechanism NN blog-dshr-org-7824 163 28 would would MD blog-dshr-org-7824 163 29 have have VB blog-dshr-org-7824 163 30 a a DT blog-dshr-org-7824 163 31 trustworthy trustworthy JJ blog-dshr-org-7824 163 32 source source NN blog-dshr-org-7824 163 33 of of IN blog-dshr-org-7824 163 34 the the DT blog-dshr-org-7824 163 35 hashes hash NNS blog-dshr-org-7824 163 36 it -PRON- PRP blog-dshr-org-7824 163 37 needs need VBZ blog-dshr-org-7824 163 38 to to TO blog-dshr-org-7824 163 39 do do VB blog-dshr-org-7824 163 40 its -PRON- PRP$ blog-dshr-org-7824 163 41 job job NN blog-dshr-org-7824 163 42 . . . blog-dshr-org-7824 164 1 Remaining remain VBG blog-dshr-org-7824 164 2 Software software NN blog-dshr-org-7824 164 3 Problems Problems NNPS blog-dshr-org-7824 164 4 Despite despite IN blog-dshr-org-7824 164 5 all all PDT blog-dshr-org-7824 164 6 these these DT blog-dshr-org-7824 164 7 enhancements enhancement NNS blog-dshr-org-7824 164 8 , , , blog-dshr-org-7824 164 9 the the DT blog-dshr-org-7824 164 10 event event NN blog-dshr-org-7824 164 11 - - HYPH blog-dshr-org-7824 164 12 stream stream NN blog-dshr-org-7824 164 13 attack attack NN blog-dshr-org-7824 164 14 would would MD blog-dshr-org-7824 164 15 still still RB blog-dshr-org-7824 164 16 have have VB blog-dshr-org-7824 164 17 succeeded succeed VBN blog-dshr-org-7824 164 18 . . . blog-dshr-org-7824 165 1 The the DT blog-dshr-org-7824 165 2 attackers attacker NNS blog-dshr-org-7824 165 3 targeted target VBD blog-dshr-org-7824 165 4 a a DT blog-dshr-org-7824 165 5 widely widely RB blog-dshr-org-7824 165 6 - - HYPH blog-dshr-org-7824 165 7 used use VBN blog-dshr-org-7824 165 8 , , , blog-dshr-org-7824 165 9 fairly fairly RB blog-dshr-org-7824 165 10 old old JJ blog-dshr-org-7824 165 11 package package NN blog-dshr-org-7824 165 12 that that WDT blog-dshr-org-7824 165 13 was be VBD blog-dshr-org-7824 165 14 still still RB blog-dshr-org-7824 165 15 being be VBG blog-dshr-org-7824 165 16 maintained maintain VBN blog-dshr-org-7824 165 17 by by IN blog-dshr-org-7824 165 18 the the DT blog-dshr-org-7824 165 19 original original JJ blog-dshr-org-7824 165 20 author author NN blog-dshr-org-7824 165 21 , , , blog-dshr-org-7824 165 22 a a DT blog-dshr-org-7824 165 23 volunteer volunteer NN blog-dshr-org-7824 165 24 . . . blog-dshr-org-7824 166 1 They -PRON- PRP blog-dshr-org-7824 166 2 offered offer VBD blog-dshr-org-7824 166 3 to to TO blog-dshr-org-7824 166 4 take take VB blog-dshr-org-7824 166 5 over over RP blog-dshr-org-7824 166 6 what what WP blog-dshr-org-7824 166 7 had have VBD blog-dshr-org-7824 166 8 become become VBN blog-dshr-org-7824 166 9 a a DT blog-dshr-org-7824 166 10 burdensome burdensome JJ blog-dshr-org-7824 166 11 task task NN blog-dshr-org-7824 166 12 , , , blog-dshr-org-7824 166 13 and and CC blog-dshr-org-7824 166 14 the the DT blog-dshr-org-7824 166 15 offer offer NN blog-dshr-org-7824 166 16 was be VBD blog-dshr-org-7824 166 17 accepted accept VBN blog-dshr-org-7824 166 18 . . . blog-dshr-org-7824 167 1 Now now RB blog-dshr-org-7824 167 2 , , , blog-dshr-org-7824 167 3 despite despite IN blog-dshr-org-7824 167 4 the the DT blog-dshr-org-7824 167 5 fact fact NN blog-dshr-org-7824 167 6 that that IN blog-dshr-org-7824 167 7 the the DT blog-dshr-org-7824 167 8 attacker attacker NN blog-dshr-org-7824 167 9 was be VBD blog-dshr-org-7824 167 10 just just RB blog-dshr-org-7824 167 11 an an DT blog-dshr-org-7824 167 12 e e NN blog-dshr-org-7824 167 13 - - NN blog-dshr-org-7824 167 14 mail mail NN blog-dshr-org-7824 167 15 address address NN blog-dshr-org-7824 167 16 , , , blog-dshr-org-7824 167 17 they -PRON- PRP blog-dshr-org-7824 167 18 were be VBD blog-dshr-org-7824 167 19 the the DT blog-dshr-org-7824 167 20 official official JJ blog-dshr-org-7824 167 21 maintainer maintainer NN blog-dshr-org-7824 167 22 of of IN blog-dshr-org-7824 167 23 the the DT blog-dshr-org-7824 167 24 package package NN blog-dshr-org-7824 167 25 and and CC blog-dshr-org-7824 167 26 could could MD blog-dshr-org-7824 167 27 authorize authorize VB blog-dshr-org-7824 167 28 changes change NNS blog-dshr-org-7824 167 29 . . . blog-dshr-org-7824 168 1 Their -PRON- PRP$ blog-dshr-org-7824 168 2 changes change NNS blog-dshr-org-7824 168 3 , , , blog-dshr-org-7824 168 4 being be VBG blog-dshr-org-7824 168 5 authorized authorize VBN blog-dshr-org-7824 168 6 by by IN blog-dshr-org-7824 168 7 the the DT blog-dshr-org-7824 168 8 official official JJ blog-dshr-org-7824 168 9 package package NN blog-dshr-org-7824 168 10 maintainer maintainer NN blog-dshr-org-7824 168 11 , , , blog-dshr-org-7824 168 12 would would MD blog-dshr-org-7824 168 13 pass pass VB blog-dshr-org-7824 168 14 unimpeded unimpeded JJ blog-dshr-org-7824 168 15 through through IN blog-dshr-org-7824 168 16 even even RB blog-dshr-org-7824 168 17 the the DT blog-dshr-org-7824 168 18 enhanced enhanced JJ blog-dshr-org-7824 168 19 supply supply NN blog-dshr-org-7824 168 20 chain chain NN blog-dshr-org-7824 168 21 . . . blog-dshr-org-7824 169 1 First first RB blog-dshr-org-7824 169 2 , , , blog-dshr-org-7824 169 3 it -PRON- PRP blog-dshr-org-7824 169 4 is be VBZ blog-dshr-org-7824 169 5 important important JJ blog-dshr-org-7824 169 6 to to TO blog-dshr-org-7824 169 7 observe observe VB blog-dshr-org-7824 169 8 the the DT blog-dshr-org-7824 169 9 goal goal NN blog-dshr-org-7824 169 10 of of IN blog-dshr-org-7824 169 11 Hof Hof NNP blog-dshr-org-7824 169 12 and and CC blog-dshr-org-7824 169 13 Carle Carle NNP blog-dshr-org-7824 169 14 's 's POS blog-dshr-org-7824 169 15 system system NN blog-dshr-org-7824 169 16 is be VBZ blog-dshr-org-7824 169 17 to to TO blog-dshr-org-7824 169 18 detect detect VB blog-dshr-org-7824 169 19 targeted targeted JJ blog-dshr-org-7824 169 20 attacks attack NNS blog-dshr-org-7824 169 21 , , , blog-dshr-org-7824 169 22 those those DT blog-dshr-org-7824 169 23 delivered deliver VBN blog-dshr-org-7824 169 24 to to IN blog-dshr-org-7824 169 25 a a DT blog-dshr-org-7824 169 26 ( ( -LRB- blog-dshr-org-7824 169 27 typically typically RB blog-dshr-org-7824 169 28 small small JJ blog-dshr-org-7824 169 29 ) ) -RRB- blog-dshr-org-7824 169 30 subset subset NN blog-dshr-org-7824 169 31 of of IN blog-dshr-org-7824 169 32 user user NN blog-dshr-org-7824 169 33 systems system NNS blog-dshr-org-7824 169 34 . . . blog-dshr-org-7824 170 1 The the DT blog-dshr-org-7824 170 2 event event NN blog-dshr-org-7824 170 3 - - HYPH blog-dshr-org-7824 170 4 stream stream NN blog-dshr-org-7824 170 5 attack attack NN blog-dshr-org-7824 170 6 was be VBD blog-dshr-org-7824 170 7 not not RB blog-dshr-org-7824 170 8 targeted target VBN blog-dshr-org-7824 170 9 ; ; : blog-dshr-org-7824 170 10 it -PRON- PRP blog-dshr-org-7824 170 11 was be VBD blog-dshr-org-7824 170 12 delivered deliver VBN blog-dshr-org-7824 170 13 to to IN blog-dshr-org-7824 170 14 all all DT blog-dshr-org-7824 170 15 systems system NNS blog-dshr-org-7824 170 16 updating update VBG blog-dshr-org-7824 170 17 the the DT blog-dshr-org-7824 170 18 package package NN blog-dshr-org-7824 170 19 irrespective irrespective RB blog-dshr-org-7824 170 20 of of IN blog-dshr-org-7824 170 21 whether whether IN blog-dshr-org-7824 170 22 they -PRON- PRP blog-dshr-org-7824 170 23 contained contain VBD blog-dshr-org-7824 170 24 the the DT blog-dshr-org-7824 170 25 wallet wallet NN blog-dshr-org-7824 170 26 to to TO blog-dshr-org-7824 170 27 be be VB blog-dshr-org-7824 170 28 compromised compromise VBN blog-dshr-org-7824 170 29 . . . blog-dshr-org-7824 171 1 That that IN blog-dshr-org-7824 171 2 their -PRON- PRP$ blog-dshr-org-7824 171 3 system system NN blog-dshr-org-7824 171 4 is be VBZ blog-dshr-org-7824 171 5 designed design VBN blog-dshr-org-7824 171 6 only only RB blog-dshr-org-7824 171 7 to to TO blog-dshr-org-7824 171 8 detect detect VB blog-dshr-org-7824 171 9 targeted targeted JJ blog-dshr-org-7824 171 10 attacks attack NNS blog-dshr-org-7824 171 11 seems seem VBZ blog-dshr-org-7824 171 12 to to IN blog-dshr-org-7824 171 13 me -PRON- PRP blog-dshr-org-7824 171 14 to to TO blog-dshr-org-7824 171 15 be be VB blog-dshr-org-7824 171 16 a a DT blog-dshr-org-7824 171 17 significant significant JJ blog-dshr-org-7824 171 18 weakness weakness NN blog-dshr-org-7824 171 19 . . . blog-dshr-org-7824 172 1 It -PRON- PRP blog-dshr-org-7824 172 2 is be VBZ blog-dshr-org-7824 172 3 very very RB blog-dshr-org-7824 172 4 easy easy JJ blog-dshr-org-7824 172 5 to to TO blog-dshr-org-7824 172 6 design design VB blog-dshr-org-7824 172 7 an an DT blog-dshr-org-7824 172 8 attack attack NN blog-dshr-org-7824 172 9 , , , blog-dshr-org-7824 172 10 like like IN blog-dshr-org-7824 172 11 the the DT blog-dshr-org-7824 172 12 event event NN blog-dshr-org-7824 172 13 - - HYPH blog-dshr-org-7824 172 14 stream stream NN blog-dshr-org-7824 172 15 one one NN blog-dshr-org-7824 172 16 , , , blog-dshr-org-7824 172 17 that that WDT blog-dshr-org-7824 172 18 is be VBZ blog-dshr-org-7824 172 19 broadcast broadcast VBN blog-dshr-org-7824 172 20 to to IN blog-dshr-org-7824 172 21 all all DT blog-dshr-org-7824 172 22 systems system NNS blog-dshr-org-7824 172 23 but but CC blog-dshr-org-7824 172 24 is be VBZ blog-dshr-org-7824 172 25 harmless harmless JJ blog-dshr-org-7824 172 26 on on IN blog-dshr-org-7824 172 27 all all DT blog-dshr-org-7824 172 28 but but IN blog-dshr-org-7824 172 29 the the DT blog-dshr-org-7824 172 30 targets target NNS blog-dshr-org-7824 172 31 . . . blog-dshr-org-7824 173 1 Second second JJ blog-dshr-org-7824 173 2 , , , blog-dshr-org-7824 173 3 Hof Hof NNP blog-dshr-org-7824 173 4 and and CC blog-dshr-org-7824 173 5 Carle Carle NNP blog-dshr-org-7824 173 6 's 's POS blog-dshr-org-7824 173 7 system system NN blog-dshr-org-7824 173 8 operates operate VBZ blog-dshr-org-7824 173 9 asynchronously asynchronously RB blog-dshr-org-7824 173 10 , , , blog-dshr-org-7824 173 11 so so RB blog-dshr-org-7824 173 12 is be VBZ blog-dshr-org-7824 173 13 intended intend VBN blog-dshr-org-7824 173 14 to to TO blog-dshr-org-7824 173 15 detect detect VB blog-dshr-org-7824 173 16 rather rather RB blog-dshr-org-7824 173 17 than than IN blog-dshr-org-7824 173 18 prevent prevent VB blog-dshr-org-7824 173 19 victim victim NN blog-dshr-org-7824 173 20 compromise compromise NN blog-dshr-org-7824 173 21 . . . blog-dshr-org-7824 174 1 Of of RB blog-dshr-org-7824 174 2 course course RB blog-dshr-org-7824 174 3 , , , blog-dshr-org-7824 174 4 once once IN blog-dshr-org-7824 174 5 the the DT blog-dshr-org-7824 174 6 attack attack NN blog-dshr-org-7824 174 7 was be VBD blog-dshr-org-7824 174 8 detected detect VBN blog-dshr-org-7824 174 9 it -PRON- PRP blog-dshr-org-7824 174 10 could could MD blog-dshr-org-7824 174 11 be be VB blog-dshr-org-7824 174 12 unambiguously unambiguously RB blog-dshr-org-7824 174 13 attributed attribute VBN blog-dshr-org-7824 174 14 . . . blog-dshr-org-7824 175 1 But but CC blog-dshr-org-7824 175 2 : : : blog-dshr-org-7824 175 3 The the DT blog-dshr-org-7824 175 4 attack attack NN blog-dshr-org-7824 175 5 would would MD blog-dshr-org-7824 175 6 already already RB blog-dshr-org-7824 175 7 have have VB blog-dshr-org-7824 175 8 succeeded succeed VBN blog-dshr-org-7824 175 9 in in IN blog-dshr-org-7824 175 10 purloining purloin VBG blog-dshr-org-7824 175 11 cryptocurrency cryptocurrency NN blog-dshr-org-7824 175 12 from from IN blog-dshr-org-7824 175 13 the the DT blog-dshr-org-7824 175 14 target target NN blog-dshr-org-7824 175 15 wallets wallet NNS blog-dshr-org-7824 175 16 . . . blog-dshr-org-7824 176 1 This this DT blog-dshr-org-7824 176 2 seems seem VBZ blog-dshr-org-7824 176 3 to to IN blog-dshr-org-7824 176 4 me -PRON- PRP blog-dshr-org-7824 176 5 to to TO blog-dshr-org-7824 176 6 be be VB blog-dshr-org-7824 176 7 a a DT blog-dshr-org-7824 176 8 second second JJ blog-dshr-org-7824 176 9 weakness weakness NN blog-dshr-org-7824 176 10 ; ; : blog-dshr-org-7824 176 11 in in IN blog-dshr-org-7824 176 12 many many JJ blog-dshr-org-7824 176 13 cases case NNS blog-dshr-org-7824 176 14 the the DT blog-dshr-org-7824 176 15 malign malign NN blog-dshr-org-7824 176 16 package package NN blog-dshr-org-7824 176 17 would would MD blog-dshr-org-7824 176 18 only only RB blog-dshr-org-7824 176 19 need need VB blog-dshr-org-7824 176 20 to to TO blog-dshr-org-7824 176 21 be be VB blog-dshr-org-7824 176 22 resident resident JJ blog-dshr-org-7824 176 23 on on IN blog-dshr-org-7824 176 24 the the DT blog-dshr-org-7824 176 25 victim victim NN blog-dshr-org-7824 176 26 for for IN blog-dshr-org-7824 176 27 a a DT blog-dshr-org-7824 176 28 short short JJ blog-dshr-org-7824 176 29 time time NN blog-dshr-org-7824 176 30 to to TO blog-dshr-org-7824 176 31 exfiltrate exfiltrate VB blog-dshr-org-7824 176 32 critical critical JJ blog-dshr-org-7824 176 33 data datum NNS blog-dshr-org-7824 176 34 , , , blog-dshr-org-7824 176 35 or or CC blog-dshr-org-7824 176 36 install install VB blog-dshr-org-7824 176 37 further further JJ blog-dshr-org-7824 176 38 malware malware JJ blog-dshr-org-7824 176 39 providing provide VBG blog-dshr-org-7824 176 40 persistence persistence NN blog-dshr-org-7824 176 41 . . . blog-dshr-org-7824 177 1 Strictly strictly RB blog-dshr-org-7824 177 2 speaking speak VBG blog-dshr-org-7824 177 3 , , , blog-dshr-org-7824 177 4 the the DT blog-dshr-org-7824 177 5 attribution attribution NN blog-dshr-org-7824 177 6 would would MD blog-dshr-org-7824 177 7 be be VB blog-dshr-org-7824 177 8 to to IN blog-dshr-org-7824 177 9 a a DT blog-dshr-org-7824 177 10 private private JJ blog-dshr-org-7824 177 11 key key NN blog-dshr-org-7824 177 12 . . . blog-dshr-org-7824 178 1 More more RBR blog-dshr-org-7824 178 2 realistically realistically RB blog-dshr-org-7824 178 3 , , , blog-dshr-org-7824 178 4 it -PRON- PRP blog-dshr-org-7824 178 5 would would MD blog-dshr-org-7824 178 6 be be VB blog-dshr-org-7824 178 7 to to IN blog-dshr-org-7824 178 8 a a DT blog-dshr-org-7824 178 9 key key NN blog-dshr-org-7824 178 10 and and CC blog-dshr-org-7824 178 11 an an DT blog-dshr-org-7824 178 12 e e NN blog-dshr-org-7824 178 13 - - NN blog-dshr-org-7824 178 14 mail mail NN blog-dshr-org-7824 178 15 address address NN blog-dshr-org-7824 178 16 . . . blog-dshr-org-7824 179 1 In in IN blog-dshr-org-7824 179 2 the the DT blog-dshr-org-7824 179 3 case case NN blog-dshr-org-7824 179 4 of of IN blog-dshr-org-7824 179 5 an an DT blog-dshr-org-7824 179 6 attack attack NN blog-dshr-org-7824 179 7 , , , blog-dshr-org-7824 179 8 linking link VBG blog-dshr-org-7824 179 9 these these DT blog-dshr-org-7824 179 10 to to IN blog-dshr-org-7824 179 11 a a DT blog-dshr-org-7824 179 12 human human JJ blog-dshr-org-7824 179 13 malefactor malefactor NN blog-dshr-org-7824 179 14 would would MD blog-dshr-org-7824 179 15 likely likely RB blog-dshr-org-7824 179 16 be be VB blog-dshr-org-7824 179 17 difficult difficult JJ blog-dshr-org-7824 179 18 , , , blog-dshr-org-7824 179 19 leaving leave VBG blog-dshr-org-7824 179 20 the the DT blog-dshr-org-7824 179 21 perpetrators perpetrator NNS blog-dshr-org-7824 179 22 free free JJ blog-dshr-org-7824 179 23 to to TO blog-dshr-org-7824 179 24 mount mount VB blog-dshr-org-7824 179 25 further further JJ blog-dshr-org-7824 179 26 attacks attack NNS blog-dshr-org-7824 179 27 . . . blog-dshr-org-7824 180 1 Even even RB blog-dshr-org-7824 180 2 if if IN blog-dshr-org-7824 180 3 the the DT blog-dshr-org-7824 180 4 maintainer maintainer NN blog-dshr-org-7824 180 5 had have VBD blog-dshr-org-7824 180 6 not not RB blog-dshr-org-7824 180 7 , , , blog-dshr-org-7824 180 8 as as IN blog-dshr-org-7824 180 9 in in IN blog-dshr-org-7824 180 10 the the DT blog-dshr-org-7824 180 11 event event NN blog-dshr-org-7824 180 12 - - HYPH blog-dshr-org-7824 180 13 stream stream NN blog-dshr-org-7824 180 14 attack attack NN blog-dshr-org-7824 180 15 , , , blog-dshr-org-7824 180 16 been be VBN blog-dshr-org-7824 180 17 replaced replace VBN blog-dshr-org-7824 180 18 via via IN blog-dshr-org-7824 180 19 social social JJ blog-dshr-org-7824 180 20 engineering engineering NN blog-dshr-org-7824 180 21 , , , blog-dshr-org-7824 180 22 it -PRON- PRP blog-dshr-org-7824 180 23 is be VBZ blog-dshr-org-7824 180 24 possible possible JJ blog-dshr-org-7824 180 25 that that IN blog-dshr-org-7824 180 26 their -PRON- PRP$ blog-dshr-org-7824 180 27 e e NN blog-dshr-org-7824 180 28 - - NN blog-dshr-org-7824 180 29 mail mail NN blog-dshr-org-7824 180 30 and and CC blog-dshr-org-7824 180 31 private private JJ blog-dshr-org-7824 180 32 key key NN blog-dshr-org-7824 180 33 could could MD blog-dshr-org-7824 180 34 have have VB blog-dshr-org-7824 180 35 been be VBN blog-dshr-org-7824 180 36 compromised compromise VBN blog-dshr-org-7824 180 37 . . . blog-dshr-org-7824 181 1 The the DT blog-dshr-org-7824 181 2 event event NN blog-dshr-org-7824 181 3 - - HYPH blog-dshr-org-7824 181 4 stream stream NN blog-dshr-org-7824 181 5 attack attack NN blog-dshr-org-7824 181 6 can can MD blog-dshr-org-7824 181 7 be be VB blog-dshr-org-7824 181 8 thought think VBN blog-dshr-org-7824 181 9 of of IN blog-dshr-org-7824 181 10 as as IN blog-dshr-org-7824 181 11 the the DT blog-dshr-org-7824 181 12 organization organization NN blog-dshr-org-7824 181 13 - - HYPH blog-dshr-org-7824 181 14 level level NN blog-dshr-org-7824 181 15 analog analog NN blog-dshr-org-7824 181 16 of of IN blog-dshr-org-7824 181 17 a a DT blog-dshr-org-7824 181 18 Sybil Sybil NNP blog-dshr-org-7824 181 19 attack attack NN blog-dshr-org-7824 181 20 on on IN blog-dshr-org-7824 181 21 a a DT blog-dshr-org-7824 181 22 peer peer NN blog-dshr-org-7824 181 23 - - HYPH blog-dshr-org-7824 181 24 to to IN blog-dshr-org-7824 181 25 - - HYPH blog-dshr-org-7824 181 26 peer peer NN blog-dshr-org-7824 181 27 system system NN blog-dshr-org-7824 181 28 . . . blog-dshr-org-7824 182 1 Creating create VBG blog-dshr-org-7824 182 2 an an DT blog-dshr-org-7824 182 3 e e NN blog-dshr-org-7824 182 4 - - NN blog-dshr-org-7824 182 5 mail mail NN blog-dshr-org-7824 182 6 identity identity NN blog-dshr-org-7824 182 7 is be VBZ blog-dshr-org-7824 182 8 almost almost RB blog-dshr-org-7824 182 9 free free JJ blog-dshr-org-7824 182 10 . . . blog-dshr-org-7824 183 1 The the DT blog-dshr-org-7824 183 2 defense defense NN blog-dshr-org-7824 183 3 against against IN blog-dshr-org-7824 183 4 Sybil Sybil NNP blog-dshr-org-7824 183 5 attacks attack NNS blog-dshr-org-7824 183 6 is be VBZ blog-dshr-org-7824 183 7 to to TO blog-dshr-org-7824 183 8 make make VB blog-dshr-org-7824 183 9 maintaining maintain VBG blog-dshr-org-7824 183 10 and and CC blog-dshr-org-7824 183 11 using use VBG blog-dshr-org-7824 183 12 an an DT blog-dshr-org-7824 183 13 identity identity NN blog-dshr-org-7824 183 14 in in IN blog-dshr-org-7824 183 15 the the DT blog-dshr-org-7824 183 16 system system NN blog-dshr-org-7824 183 17 expensive expensive JJ blog-dshr-org-7824 183 18 . . . blog-dshr-org-7824 184 1 As as IN blog-dshr-org-7824 184 2 with with IN blog-dshr-org-7824 184 3 proof proof NN blog-dshr-org-7824 184 4 - - HYPH blog-dshr-org-7824 184 5 of of IN blog-dshr-org-7824 184 6 - - HYPH blog-dshr-org-7824 184 7 work work NN blog-dshr-org-7824 184 8 in in IN blog-dshr-org-7824 184 9 Bitcoin Bitcoin NNP blog-dshr-org-7824 184 10 , , , blog-dshr-org-7824 184 11 the the DT blog-dshr-org-7824 184 12 idea idea NN blog-dshr-org-7824 184 13 is be VBZ blog-dshr-org-7824 184 14 that that IN blog-dshr-org-7824 184 15 the the DT blog-dshr-org-7824 184 16 white white JJ blog-dshr-org-7824 184 17 hats hat NNS blog-dshr-org-7824 184 18 will will MD blog-dshr-org-7824 184 19 spend spend VB blog-dshr-org-7824 184 20 more more JJR blog-dshr-org-7824 184 21 ( ( -LRB- blog-dshr-org-7824 184 22 compute compute VB blog-dshr-org-7824 184 23 more more RBR blog-dshr-org-7824 184 24 useless useless JJ blog-dshr-org-7824 184 25 hashes hash NNS blog-dshr-org-7824 184 26 ) ) -RRB- blog-dshr-org-7824 184 27 than than IN blog-dshr-org-7824 184 28 the the DT blog-dshr-org-7824 184 29 black black JJ blog-dshr-org-7824 184 30 hats hat NNS blog-dshr-org-7824 184 31 . . . blog-dshr-org-7824 185 1 Even even RB blog-dshr-org-7824 185 2 this this DT blog-dshr-org-7824 185 3 has have VBZ blog-dshr-org-7824 185 4 limits limit NNS blog-dshr-org-7824 185 5 . . . blog-dshr-org-7824 186 1 Eric Eric NNP blog-dshr-org-7824 186 2 Budish Budish NNP blog-dshr-org-7824 186 3 's 's POS blog-dshr-org-7824 186 4 analysis analysis NN blog-dshr-org-7824 186 5 shows show VBZ blog-dshr-org-7824 186 6 that that IN blog-dshr-org-7824 186 7 , , , blog-dshr-org-7824 186 8 if if IN blog-dshr-org-7824 186 9 the the DT blog-dshr-org-7824 186 10 potential potential JJ blog-dshr-org-7824 186 11 gain gain NN blog-dshr-org-7824 186 12 from from IN blog-dshr-org-7824 186 13 an an DT blog-dshr-org-7824 186 14 attack attack NN blog-dshr-org-7824 186 15 on on IN blog-dshr-org-7824 186 16 a a DT blog-dshr-org-7824 186 17 blockchain blockchain NN blog-dshr-org-7824 186 18 is be VBZ blog-dshr-org-7824 186 19 to to TO blog-dshr-org-7824 186 20 be be VB blog-dshr-org-7824 186 21 outweighed outweigh VBN blog-dshr-org-7824 186 22 by by IN blog-dshr-org-7824 186 23 its -PRON- PRP$ blog-dshr-org-7824 186 24 cost cost NN blog-dshr-org-7824 186 25 , , , blog-dshr-org-7824 186 26 the the DT blog-dshr-org-7824 186 27 value value NN blog-dshr-org-7824 186 28 of of IN blog-dshr-org-7824 186 29 transactions transaction NNS blog-dshr-org-7824 186 30 in in IN blog-dshr-org-7824 186 31 a a DT blog-dshr-org-7824 186 32 block block NN blog-dshr-org-7824 186 33 must must MD blog-dshr-org-7824 186 34 be be VB blog-dshr-org-7824 186 35 less less JJR blog-dshr-org-7824 186 36 than than IN blog-dshr-org-7824 186 37 the the DT blog-dshr-org-7824 186 38 block block NN blog-dshr-org-7824 186 39 reward reward NN blog-dshr-org-7824 186 40 . . . blog-dshr-org-7824 187 1 Would Would MD blog-dshr-org-7824 187 2 a a DT blog-dshr-org-7824 187 3 similar similar JJ blog-dshr-org-7824 187 4 defense defense NN blog-dshr-org-7824 187 5 against against IN blog-dshr-org-7824 187 6 " " `` blog-dshr-org-7824 187 7 Sybil Sybil NNP blog-dshr-org-7824 187 8 " " '' blog-dshr-org-7824 187 9 attacks attack NNS blog-dshr-org-7824 187 10 on on IN blog-dshr-org-7824 187 11 the the DT blog-dshr-org-7824 187 12 software software NN blog-dshr-org-7824 187 13 supply supply NN blog-dshr-org-7824 187 14 chain chain NN blog-dshr-org-7824 187 15 be be VB blog-dshr-org-7824 187 16 possible possible JJ blog-dshr-org-7824 187 17 ? ? . blog-dshr-org-7824 188 1 There there EX blog-dshr-org-7824 188 2 are be VBP blog-dshr-org-7824 188 3 a a DT blog-dshr-org-7824 188 4 number number NN blog-dshr-org-7824 188 5 of of IN blog-dshr-org-7824 188 6 issues issue NNS blog-dshr-org-7824 188 7 : : : blog-dshr-org-7824 188 8 The the DT blog-dshr-org-7824 188 9 potential potential JJ blog-dshr-org-7824 188 10 gains gain NNS blog-dshr-org-7824 188 11 from from IN blog-dshr-org-7824 188 12 such such JJ blog-dshr-org-7824 188 13 attacks attack NNS blog-dshr-org-7824 188 14 are be VBP blog-dshr-org-7824 188 15 large large JJ blog-dshr-org-7824 188 16 , , , blog-dshr-org-7824 188 17 both both DT blog-dshr-org-7824 188 18 because because IN blog-dshr-org-7824 188 19 they -PRON- PRP blog-dshr-org-7824 188 20 can can MD blog-dshr-org-7824 188 21 compromise compromise VB blog-dshr-org-7824 188 22 very very RB blog-dshr-org-7824 188 23 large large JJ blog-dshr-org-7824 188 24 numbers number NNS blog-dshr-org-7824 188 25 of of IN blog-dshr-org-7824 188 26 systems system NNS blog-dshr-org-7824 188 27 quickly quickly RB blog-dshr-org-7824 188 28 ( ( -LRB- blog-dshr-org-7824 188 29 event event NN blog-dshr-org-7824 188 30 - - HYPH blog-dshr-org-7824 188 31 stream stream NN blog-dshr-org-7824 188 32 had have VBD blog-dshr-org-7824 188 33 2 2 CD blog-dshr-org-7824 188 34 M m CD blog-dshr-org-7824 188 35 downloads download NNS blog-dshr-org-7824 188 36 ) ) -RRB- blog-dshr-org-7824 188 37 , , , blog-dshr-org-7824 188 38 and and CC blog-dshr-org-7824 188 39 because because IN blog-dshr-org-7824 188 40 the the DT blog-dshr-org-7824 188 41 banking banking NN blog-dshr-org-7824 188 42 credentials credential NNS blog-dshr-org-7824 188 43 , , , blog-dshr-org-7824 188 44 cryptocurrency cryptocurrency NN blog-dshr-org-7824 188 45 wallets wallet NNS blog-dshr-org-7824 188 46 , , , blog-dshr-org-7824 188 47 and and CC blog-dshr-org-7824 188 48 other other JJ blog-dshr-org-7824 188 49 data datum NNS blog-dshr-org-7824 188 50 these these DT blog-dshr-org-7824 188 51 systems system NNS blog-dshr-org-7824 188 52 contain contain VBP blog-dshr-org-7824 188 53 can can MD blog-dshr-org-7824 188 54 quickly quickly RB blog-dshr-org-7824 188 55 be be VB blog-dshr-org-7824 188 56 converted convert VBN blog-dshr-org-7824 188 57 into into IN blog-dshr-org-7824 188 58 large large JJ blog-dshr-org-7824 188 59 amounts amount NNS blog-dshr-org-7824 188 60 of of IN blog-dshr-org-7824 188 61 cash cash NN blog-dshr-org-7824 188 62 . . . blog-dshr-org-7824 189 1 Thus thus RB blog-dshr-org-7824 189 2 the the DT blog-dshr-org-7824 189 3 penalty penalty NN blog-dshr-org-7824 189 4 for for IN blog-dshr-org-7824 189 5 mounting mount VBG blog-dshr-org-7824 189 6 an an DT blog-dshr-org-7824 189 7 attack attack NN blog-dshr-org-7824 189 8 would would MD blog-dshr-org-7824 189 9 have have VB blog-dshr-org-7824 189 10 to to TO blog-dshr-org-7824 189 11 be be VB blog-dshr-org-7824 189 12 an an DT blog-dshr-org-7824 189 13 even even RB blog-dshr-org-7824 189 14 larger large JJR blog-dshr-org-7824 189 15 amount amount NN blog-dshr-org-7824 189 16 of of IN blog-dshr-org-7824 189 17 cash cash NN blog-dshr-org-7824 189 18 . . . blog-dshr-org-7824 190 1 Package package NN blog-dshr-org-7824 190 2 maintainers maintainer NNS blog-dshr-org-7824 190 3 would would MD blog-dshr-org-7824 190 4 need need VB blog-dshr-org-7824 190 5 to to TO blog-dshr-org-7824 190 6 be be VB blog-dshr-org-7824 190 7 bonded bond VBN blog-dshr-org-7824 190 8 or or CC blog-dshr-org-7824 190 9 insured insure VBN blog-dshr-org-7824 190 10 for for IN blog-dshr-org-7824 190 11 large large JJ blog-dshr-org-7824 190 12 sums sum NNS blog-dshr-org-7824 190 13 , , , blog-dshr-org-7824 190 14 which which WDT blog-dshr-org-7824 190 15 implies imply VBZ blog-dshr-org-7824 190 16 that that IN blog-dshr-org-7824 190 17 distributions distribution NNS blog-dshr-org-7824 190 18 and and CC blog-dshr-org-7824 190 19 package package NN blog-dshr-org-7824 190 20 libraries library NNS blog-dshr-org-7824 190 21 would would MD blog-dshr-org-7824 190 22 need need VB blog-dshr-org-7824 190 23 organizational organizational JJ blog-dshr-org-7824 190 24 structures structure NNS blog-dshr-org-7824 190 25 capable capable JJ blog-dshr-org-7824 190 26 of of IN blog-dshr-org-7824 190 27 enforcing enforce VBG blog-dshr-org-7824 190 28 these these DT blog-dshr-org-7824 190 29 requirements requirement NNS blog-dshr-org-7824 190 30 . . . blog-dshr-org-7824 191 1 Bonding bonding NN blog-dshr-org-7824 191 2 and and CC blog-dshr-org-7824 191 3 insurance insurance NN blog-dshr-org-7824 191 4 would would MD blog-dshr-org-7824 191 5 be be VB blog-dshr-org-7824 191 6 expensive expensive JJ blog-dshr-org-7824 191 7 for for IN blog-dshr-org-7824 191 8 package package NN blog-dshr-org-7824 191 9 maintainers maintainer NNS blog-dshr-org-7824 191 10 , , , blog-dshr-org-7824 191 11 who who WP blog-dshr-org-7824 191 12 are be VBP blog-dshr-org-7824 191 13 mostly mostly RB blog-dshr-org-7824 191 14 unpaid unpaid JJ blog-dshr-org-7824 191 15 volunteers volunteer NNS blog-dshr-org-7824 191 16 . . . blog-dshr-org-7824 192 1 There there EX blog-dshr-org-7824 192 2 would would MD blog-dshr-org-7824 192 3 have have VB blog-dshr-org-7824 192 4 to to TO blog-dshr-org-7824 192 5 be be VB blog-dshr-org-7824 192 6 a a DT blog-dshr-org-7824 192 7 way way NN blog-dshr-org-7824 192 8 of of IN blog-dshr-org-7824 192 9 paying pay VBG blog-dshr-org-7824 192 10 them -PRON- PRP blog-dshr-org-7824 192 11 for for IN blog-dshr-org-7824 192 12 their -PRON- PRP$ blog-dshr-org-7824 192 13 efforts effort NNS blog-dshr-org-7824 192 14 , , , blog-dshr-org-7824 192 15 at at IN blog-dshr-org-7824 192 16 least least JJS blog-dshr-org-7824 192 17 enough enough RB blog-dshr-org-7824 192 18 to to TO blog-dshr-org-7824 192 19 cover cover VB blog-dshr-org-7824 192 20 the the DT blog-dshr-org-7824 192 21 costs cost NNS blog-dshr-org-7824 192 22 of of IN blog-dshr-org-7824 192 23 bonding bonding NN blog-dshr-org-7824 192 24 and and CC blog-dshr-org-7824 192 25 insurance insurance NN blog-dshr-org-7824 192 26 . . . blog-dshr-org-7824 193 1 Thus thus RB blog-dshr-org-7824 193 2 users user NNS blog-dshr-org-7824 193 3 of of IN blog-dshr-org-7824 193 4 the the DT blog-dshr-org-7824 193 5 packages package NNS blog-dshr-org-7824 193 6 would would MD blog-dshr-org-7824 193 7 need need VB blog-dshr-org-7824 193 8 to to TO blog-dshr-org-7824 193 9 pay pay VB blog-dshr-org-7824 193 10 for for IN blog-dshr-org-7824 193 11 their -PRON- PRP$ blog-dshr-org-7824 193 12 use use NN blog-dshr-org-7824 193 13 , , , blog-dshr-org-7824 193 14 which which WDT blog-dshr-org-7824 193 15 means mean VBZ blog-dshr-org-7824 193 16 the the DT blog-dshr-org-7824 193 17 packages package NNS blog-dshr-org-7824 193 18 could could MD blog-dshr-org-7824 193 19 neither neither CC blog-dshr-org-7824 193 20 be be VB blog-dshr-org-7824 193 21 free free JJ blog-dshr-org-7824 193 22 , , , blog-dshr-org-7824 193 23 nor nor CC blog-dshr-org-7824 193 24 open open JJ blog-dshr-org-7824 193 25 source source NN blog-dshr-org-7824 193 26 . . . blog-dshr-org-7824 194 1 The the DT blog-dshr-org-7824 194 2 FOSS FOSS NNP blog-dshr-org-7824 194 3 ( ( -LRB- blog-dshr-org-7824 194 4 Free Free NNP blog-dshr-org-7824 194 5 Open open JJ blog-dshr-org-7824 194 6 Source source NN blog-dshr-org-7824 194 7 Software Software NNP blog-dshr-org-7824 194 8 ) ) -RRB- blog-dshr-org-7824 194 9 movement movement NN blog-dshr-org-7824 194 10 will will MD blog-dshr-org-7824 194 11 need need VB blog-dshr-org-7824 194 12 to to TO blog-dshr-org-7824 194 13 find find VB blog-dshr-org-7824 194 14 other other JJ blog-dshr-org-7824 194 15 ways way NNS blog-dshr-org-7824 194 16 to to TO blog-dshr-org-7824 194 17 combat combat VB blog-dshr-org-7824 194 18 Sybil Sybil NNP blog-dshr-org-7824 194 19 attacks attack NNS blog-dshr-org-7824 194 20 , , , blog-dshr-org-7824 194 21 which which WDT blog-dshr-org-7824 194 22 will will MD blog-dshr-org-7824 194 23 be be VB blog-dshr-org-7824 194 24 hard hard JJ blog-dshr-org-7824 194 25 if if IN blog-dshr-org-7824 194 26 the the DT blog-dshr-org-7824 194 27 reward reward NN blog-dshr-org-7824 194 28 for for IN blog-dshr-org-7824 194 29 a a DT blog-dshr-org-7824 194 30 successful successful JJ blog-dshr-org-7824 194 31 attack attack NN blog-dshr-org-7824 194 32 greatly greatly RB blog-dshr-org-7824 194 33 exceeds exceed VBZ blog-dshr-org-7824 194 34 the the DT blog-dshr-org-7824 194 35 cost cost NN blog-dshr-org-7824 194 36 of of IN blog-dshr-org-7824 194 37 mounting mount VBG blog-dshr-org-7824 194 38 it -PRON- PRP blog-dshr-org-7824 194 39 . . . blog-dshr-org-7824 195 1 How how WRB blog-dshr-org-7824 195 2 to to TO blog-dshr-org-7824 195 3 adequately adequately RB blog-dshr-org-7824 195 4 reward reward VB blog-dshr-org-7824 195 5 maintainers maintainer NNS blog-dshr-org-7824 195 6 for for IN blog-dshr-org-7824 195 7 their -PRON- PRP$ blog-dshr-org-7824 195 8 essential essential JJ blog-dshr-org-7824 195 9 but but CC blog-dshr-org-7824 195 10 under under RB blog-dshr-org-7824 195 11 - - HYPH blog-dshr-org-7824 195 12 appreciated appreciate VBN blog-dshr-org-7824 195 13 efforts effort NNS blog-dshr-org-7824 195 14 is be VBZ blog-dshr-org-7824 195 15 a a DT blog-dshr-org-7824 195 16 fundamental fundamental JJ blog-dshr-org-7824 195 17 problem problem NN blog-dshr-org-7824 195 18 for for IN blog-dshr-org-7824 195 19 FOSS FOSS NNP blog-dshr-org-7824 195 20 . . . blog-dshr-org-7824 196 1 Hof Hof NNP blog-dshr-org-7824 196 2 and and CC blog-dshr-org-7824 196 3 Carle Carle NNP blog-dshr-org-7824 196 4 's 's POS blog-dshr-org-7824 196 5 system system NN blog-dshr-org-7824 196 6 shares share VBZ blog-dshr-org-7824 196 7 one one CD blog-dshr-org-7824 196 8 more more JJR blog-dshr-org-7824 196 9 difficulty difficulty NN blog-dshr-org-7824 196 10 with with IN blog-dshr-org-7824 196 11 CT CT NNP blog-dshr-org-7824 196 12 . . . blog-dshr-org-7824 197 1 Both both DT blog-dshr-org-7824 197 2 systems system NNS blog-dshr-org-7824 197 3 are be VBP blog-dshr-org-7824 197 4 layered layer VBN blog-dshr-org-7824 197 5 on on IN blog-dshr-org-7824 197 6 top top NN blog-dshr-org-7824 197 7 of of IN blog-dshr-org-7824 197 8 an an DT blog-dshr-org-7824 197 9 existing exist VBG blog-dshr-org-7824 197 10 infrastructure infrastructure NN blog-dshr-org-7824 197 11 , , , blog-dshr-org-7824 197 12 respectively respectively RB blog-dshr-org-7824 197 13 APT apt NN blog-dshr-org-7824 197 14 and and CC blog-dshr-org-7824 197 15 TLS TLS NNP blog-dshr-org-7824 197 16 with with IN blog-dshr-org-7824 197 17 certificate certificate NN blog-dshr-org-7824 197 18 authorities authority NNS blog-dshr-org-7824 197 19 . . . blog-dshr-org-7824 198 1 In in IN blog-dshr-org-7824 198 2 both both DT blog-dshr-org-7824 198 3 cases case NNS blog-dshr-org-7824 198 4 there there EX blog-dshr-org-7824 198 5 is be VBZ blog-dshr-org-7824 198 6 a a DT blog-dshr-org-7824 198 7 bootstrap bootstrap NN blog-dshr-org-7824 198 8 problem problem NN blog-dshr-org-7824 198 9 , , , blog-dshr-org-7824 198 10 an an DT blog-dshr-org-7824 198 11 assumption assumption NN blog-dshr-org-7824 198 12 that that IN blog-dshr-org-7824 198 13 as as IN blog-dshr-org-7824 198 14 the the DT blog-dshr-org-7824 198 15 system system NN blog-dshr-org-7824 198 16 starts start VBZ blog-dshr-org-7824 198 17 up up RB blog-dshr-org-7824 198 18 there there EX blog-dshr-org-7824 198 19 is be VBZ blog-dshr-org-7824 198 20 not not RB blog-dshr-org-7824 198 21 an an DT blog-dshr-org-7824 198 22 attack attack NN blog-dshr-org-7824 198 23 already already RB blog-dshr-org-7824 198 24 underway underway JJ blog-dshr-org-7824 198 25 . . . blog-dshr-org-7824 199 1 In in IN blog-dshr-org-7824 199 2 CT CT NNP blog-dshr-org-7824 199 3 's 's POS blog-dshr-org-7824 199 4 case case NN blog-dshr-org-7824 199 5 the the DT blog-dshr-org-7824 199 6 communications communication NNS blog-dshr-org-7824 199 7 between between IN blog-dshr-org-7824 199 8 the the DT blog-dshr-org-7824 199 9 CA CA NNP blog-dshr-org-7824 199 10 's 's POS blog-dshr-org-7824 199 11 , , , blog-dshr-org-7824 199 12 Web web NN blog-dshr-org-7824 199 13 sites site NNS blog-dshr-org-7824 199 14 , , , blog-dshr-org-7824 199 15 logs log NNS blog-dshr-org-7824 199 16 , , , blog-dshr-org-7824 199 17 auditors auditor NNS blog-dshr-org-7824 199 18 and and CC blog-dshr-org-7824 199 19 monitors monitor NNS blog-dshr-org-7824 199 20 all all DT blog-dshr-org-7824 199 21 use use VBP blog-dshr-org-7824 199 22 the the DT blog-dshr-org-7824 199 23 very very JJ blog-dshr-org-7824 199 24 TLS tls NN blog-dshr-org-7824 199 25 infrastructure infrastructure NN blog-dshr-org-7824 199 26 that that WDT blog-dshr-org-7824 199 27 is be VBZ blog-dshr-org-7824 199 28 being be VBG blog-dshr-org-7824 199 29 secured secure VBN blog-dshr-org-7824 199 30 ( ( -LRB- blog-dshr-org-7824 199 31 see see VB blog-dshr-org-7824 199 32 here here RB blog-dshr-org-7824 199 33 and and CC blog-dshr-org-7824 199 34 here here RB blog-dshr-org-7824 199 35 ) ) -RRB- blog-dshr-org-7824 199 36 . . . blog-dshr-org-7824 200 1 This this DT blog-dshr-org-7824 200 2 is be VBZ blog-dshr-org-7824 200 3 also also RB blog-dshr-org-7824 200 4 the the DT blog-dshr-org-7824 200 5 case case NN blog-dshr-org-7824 200 6 for for IN blog-dshr-org-7824 200 7 Hof Hof NNP blog-dshr-org-7824 200 8 and and CC blog-dshr-org-7824 200 9 Carle Carle NNP blog-dshr-org-7824 200 10 , , , blog-dshr-org-7824 200 11 plus plus CC blog-dshr-org-7824 200 12 they -PRON- PRP blog-dshr-org-7824 200 13 have have VBP blog-dshr-org-7824 200 14 to to TO blog-dshr-org-7824 200 15 assume assume VB blog-dshr-org-7824 200 16 the the DT blog-dshr-org-7824 200 17 lack lack NN blog-dshr-org-7824 200 18 of of IN blog-dshr-org-7824 200 19 malware malware NN blog-dshr-org-7824 200 20 in in IN blog-dshr-org-7824 200 21 the the DT blog-dshr-org-7824 200 22 initial initial JJ blog-dshr-org-7824 200 23 state state NN blog-dshr-org-7824 200 24 of of IN blog-dshr-org-7824 200 25 the the DT blog-dshr-org-7824 200 26 packages package NNS blog-dshr-org-7824 200 27 . . . blog-dshr-org-7824 201 1 Hardware Hardware NNP blog-dshr-org-7824 201 2 Supply Supply NNP blog-dshr-org-7824 201 3 Chain chain NN blog-dshr-org-7824 201 4 Problems problem NNS blog-dshr-org-7824 201 5 All all PDT blog-dshr-org-7824 201 6 this this DT blog-dshr-org-7824 201 7 effort effort NN blog-dshr-org-7824 201 8 to to TO blog-dshr-org-7824 201 9 secure secure VB blog-dshr-org-7824 201 10 the the DT blog-dshr-org-7824 201 11 software software NN blog-dshr-org-7824 201 12 supply supply NN blog-dshr-org-7824 201 13 chain chain NN blog-dshr-org-7824 201 14 will will MD blog-dshr-org-7824 201 15 be be VB blog-dshr-org-7824 201 16 for for IN blog-dshr-org-7824 201 17 naught naught NN blog-dshr-org-7824 201 18 if if IN blog-dshr-org-7824 201 19 the the DT blog-dshr-org-7824 201 20 hardware hardware NN blog-dshr-org-7824 201 21 it -PRON- PRP blog-dshr-org-7824 201 22 runs run VBZ blog-dshr-org-7824 201 23 on on IN blog-dshr-org-7824 201 24 is be VBZ blog-dshr-org-7824 201 25 compromised compromise VBN blog-dshr-org-7824 201 26 : : : blog-dshr-org-7824 201 27 Much much JJ blog-dshr-org-7824 201 28 of of IN blog-dshr-org-7824 201 29 what what WP blog-dshr-org-7824 201 30 we -PRON- PRP blog-dshr-org-7824 201 31 think think VBP blog-dshr-org-7824 201 32 of of IN blog-dshr-org-7824 201 33 as as IN blog-dshr-org-7824 201 34 " " `` blog-dshr-org-7824 201 35 hardware hardware NN blog-dshr-org-7824 201 36 " " '' blog-dshr-org-7824 201 37 contains contain VBZ blog-dshr-org-7824 201 38 software software NN blog-dshr-org-7824 201 39 to to TO blog-dshr-org-7824 201 40 which which WDT blog-dshr-org-7824 201 41 what what WP blog-dshr-org-7824 201 42 we -PRON- PRP blog-dshr-org-7824 201 43 think think VBP blog-dshr-org-7824 201 44 of of IN blog-dshr-org-7824 201 45 as as IN blog-dshr-org-7824 201 46 " " `` blog-dshr-org-7824 201 47 software software NN blog-dshr-org-7824 201 48 " " '' blog-dshr-org-7824 201 49 has have VBZ blog-dshr-org-7824 201 50 no no DT blog-dshr-org-7824 201 51 access access NN blog-dshr-org-7824 201 52 or or CC blog-dshr-org-7824 201 53 visibility visibility NN blog-dshr-org-7824 201 54 . . . blog-dshr-org-7824 202 1 Examples example NNS blog-dshr-org-7824 202 2 include include VBP blog-dshr-org-7824 202 3 Intel Intel NNP blog-dshr-org-7824 202 4 's 's POS blog-dshr-org-7824 202 5 Management Management NNP blog-dshr-org-7824 202 6 Engine Engine NNP blog-dshr-org-7824 202 7 , , , blog-dshr-org-7824 202 8 the the DT blog-dshr-org-7824 202 9 baseband baseband NN blog-dshr-org-7824 202 10 processor processor NN blog-dshr-org-7824 202 11 in in IN blog-dshr-org-7824 202 12 mobile mobile JJ blog-dshr-org-7824 202 13 devices device NNS blog-dshr-org-7824 202 14 , , , blog-dshr-org-7824 202 15 complex complex JJ blog-dshr-org-7824 202 16 I i NN blog-dshr-org-7824 202 17 / / SYM blog-dshr-org-7824 202 18 O o NN blog-dshr-org-7824 202 19 devices device NNS blog-dshr-org-7824 202 20 such such JJ blog-dshr-org-7824 202 21 as as IN blog-dshr-org-7824 202 22 NICs nic NNS blog-dshr-org-7824 202 23 and and CC blog-dshr-org-7824 202 24 GPUs gpu NNS blog-dshr-org-7824 202 25 . . . blog-dshr-org-7824 203 1 Even even RB blog-dshr-org-7824 203 2 if if IN blog-dshr-org-7824 203 3 this this DT blog-dshr-org-7824 203 4 " " `` blog-dshr-org-7824 203 5 firmware firmware NN blog-dshr-org-7824 203 6 " " '' blog-dshr-org-7824 203 7 is be VBZ blog-dshr-org-7824 203 8 visible visible JJ blog-dshr-org-7824 203 9 to to IN blog-dshr-org-7824 203 10 the the DT blog-dshr-org-7824 203 11 system system NN blog-dshr-org-7824 203 12 CPU cpu NN blog-dshr-org-7824 203 13 , , , blog-dshr-org-7824 203 14 it -PRON- PRP blog-dshr-org-7824 203 15 is be VBZ blog-dshr-org-7824 203 16 likely likely RB blog-dshr-org-7824 203 17 supplied supply VBN blog-dshr-org-7824 203 18 as as IN blog-dshr-org-7824 203 19 a a DT blog-dshr-org-7824 203 20 " " `` blog-dshr-org-7824 203 21 binary binary JJ blog-dshr-org-7824 203 22 blob blob NN blog-dshr-org-7824 203 23 " " '' blog-dshr-org-7824 203 24 whose whose WP$ blog-dshr-org-7824 203 25 source source NN blog-dshr-org-7824 203 26 code code NN blog-dshr-org-7824 203 27 is be VBZ blog-dshr-org-7824 203 28 inaccessible inaccessible JJ blog-dshr-org-7824 203 29 . . . blog-dshr-org-7824 204 1 Attacks attack NNS blog-dshr-org-7824 204 2 on on IN blog-dshr-org-7824 204 3 the the DT blog-dshr-org-7824 204 4 hardware hardware NN blog-dshr-org-7824 204 5 supply supply NN blog-dshr-org-7824 204 6 chain chain NN blog-dshr-org-7824 204 7 have have VBP blog-dshr-org-7824 204 8 been be VBN blog-dshr-org-7824 204 9 in in IN blog-dshr-org-7824 204 10 the the DT blog-dshr-org-7824 204 11 news news NN blog-dshr-org-7824 204 12 recently recently RB blog-dshr-org-7824 204 13 , , , blog-dshr-org-7824 204 14 with with IN blog-dshr-org-7824 204 15 the the DT blog-dshr-org-7824 204 16 firestorm firestorm NN blog-dshr-org-7824 204 17 of of IN blog-dshr-org-7824 204 18 publicity publicity NN blog-dshr-org-7824 204 19 sparked spark VBN blog-dshr-org-7824 204 20 by by IN blog-dshr-org-7824 204 21 Bloomberg Bloomberg NNP blog-dshr-org-7824 204 22 's 's POS blog-dshr-org-7824 204 23 , , , blog-dshr-org-7824 204 24 probably probably RB blog-dshr-org-7824 204 25 erroneous erroneous JJ blog-dshr-org-7824 204 26 reports report NNS blog-dshr-org-7824 204 27 , , , blog-dshr-org-7824 204 28 of of IN blog-dshr-org-7824 204 29 a a DT blog-dshr-org-7824 204 30 Chinese chinese JJ blog-dshr-org-7824 204 31 attack attack NN blog-dshr-org-7824 204 32 on on IN blog-dshr-org-7824 204 33 SuperMicro SuperMicro NNP blog-dshr-org-7824 204 34 motherboards motherboard NNS blog-dshr-org-7824 204 35 that that WDT blog-dshr-org-7824 204 36 added add VBD blog-dshr-org-7824 204 37 " " `` blog-dshr-org-7824 204 38 rice rice NN blog-dshr-org-7824 204 39 - - HYPH blog-dshr-org-7824 204 40 grain grain NN blog-dshr-org-7824 204 41 " " '' blog-dshr-org-7824 204 42 sized sized JJ blog-dshr-org-7824 204 43 malign malign NN blog-dshr-org-7824 204 44 chips chip NNS blog-dshr-org-7824 204 45 . . . blog-dshr-org-7824 205 1 The the DT blog-dshr-org-7824 205 2 details detail NNS blog-dshr-org-7824 205 3 will will MD blog-dshr-org-7824 205 4 have have VB blog-dshr-org-7824 205 5 to to TO blog-dshr-org-7824 205 6 wait wait VB blog-dshr-org-7824 205 7 for for IN blog-dshr-org-7824 205 8 a a DT blog-dshr-org-7824 205 9 future future JJ blog-dshr-org-7824 205 10 post post NN blog-dshr-org-7824 205 11 . . . blog-dshr-org-7824 206 1 Posted post VBN blog-dshr-org-7824 206 2 by by IN blog-dshr-org-7824 206 3 David David NNP blog-dshr-org-7824 206 4 . . . blog-dshr-org-7824 207 1 at at IN blog-dshr-org-7824 207 2 8:00 8:00 CD blog-dshr-org-7824 207 3 AM am NN blog-dshr-org-7824 207 4 Labels Labels NNPS blog-dshr-org-7824 207 5 : : : blog-dshr-org-7824 207 6 security security NN blog-dshr-org-7824 207 7 24 24 CD blog-dshr-org-7824 207 8 comments comment NNS blog-dshr-org-7824 207 9 : : : blog-dshr-org-7824 207 10 Bryan Bryan NNP blog-dshr-org-7824 207 11 Newbold Newbold NNP blog-dshr-org-7824 207 12 said say VBD blog-dshr-org-7824 207 13 ... ... : blog-dshr-org-7824 207 14 Nit Nit NNP blog-dshr-org-7824 207 15 : : : blog-dshr-org-7824 207 16 in in IN blog-dshr-org-7824 207 17 the the DT blog-dshr-org-7824 207 18 last last JJ blog-dshr-org-7824 207 19 bullet bullet NN blog-dshr-org-7824 207 20 point point NN blog-dshr-org-7824 207 21 , , , blog-dshr-org-7824 207 22 I -PRON- PRP blog-dshr-org-7824 207 23 think think VBP blog-dshr-org-7824 207 24 you -PRON- PRP blog-dshr-org-7824 207 25 mean mean VBP blog-dshr-org-7824 207 26 " " `` blog-dshr-org-7824 207 27 Bloomberg Bloomberg NNP blog-dshr-org-7824 207 28 " " '' blog-dshr-org-7824 207 29 , , , blog-dshr-org-7824 207 30 not not RB blog-dshr-org-7824 207 31 " " `` blog-dshr-org-7824 207 32 Motherboard Motherboard NNP blog-dshr-org-7824 207 33 " " '' blog-dshr-org-7824 207 34 . . . blog-dshr-org-7824 208 1 December December NNP blog-dshr-org-7824 208 2 18 18 CD blog-dshr-org-7824 208 3 , , , blog-dshr-org-7824 208 4 2018 2018 CD blog-dshr-org-7824 208 5 at at IN blog-dshr-org-7824 208 6 1:58 1:58 CD blog-dshr-org-7824 208 7 PM pm NN blog-dshr-org-7824 208 8 David David NNP blog-dshr-org-7824 208 9 . . . blog-dshr-org-7824 209 1 said say VBD blog-dshr-org-7824 209 2 ... ... : blog-dshr-org-7824 210 1 Thanks thank NNS blog-dshr-org-7824 210 2 for for IN blog-dshr-org-7824 210 3 correcting correct VBG blog-dshr-org-7824 210 4 my -PRON- PRP$ blog-dshr-org-7824 210 5 fused fuse VBN blog-dshr-org-7824 210 6 neurons neuron NNS blog-dshr-org-7824 210 7 , , , blog-dshr-org-7824 210 8 Bryan Bryan NNP blog-dshr-org-7824 210 9 ! ! . blog-dshr-org-7824 211 1 December December NNP blog-dshr-org-7824 211 2 18 18 CD blog-dshr-org-7824 211 3 , , , blog-dshr-org-7824 211 4 2018 2018 CD blog-dshr-org-7824 211 5 at at IN blog-dshr-org-7824 211 6 4:10 4:10 CD blog-dshr-org-7824 211 7 PM pm NN blog-dshr-org-7824 211 8 David David NNP blog-dshr-org-7824 211 9 . . . blog-dshr-org-7824 212 1 said say VBD blog-dshr-org-7824 212 2 ... ... : blog-dshr-org-7824 213 1 I -PRON- PRP blog-dshr-org-7824 213 2 really really RB blog-dshr-org-7824 213 3 should should MD blog-dshr-org-7824 213 4 have have VB blog-dshr-org-7824 213 5 pointed point VBN blog-dshr-org-7824 213 6 out out RP blog-dshr-org-7824 213 7 that that IN blog-dshr-org-7824 213 8 this this DT blog-dshr-org-7824 213 9 whole whole JJ blog-dshr-org-7824 213 10 post post NN blog-dshr-org-7824 213 11 is be VBZ blog-dshr-org-7824 213 12 about about IN blog-dshr-org-7824 213 13 software software NN blog-dshr-org-7824 213 14 that that WDT blog-dshr-org-7824 213 15 is be VBZ blog-dshr-org-7824 213 16 installed instal VBN blog-dshr-org-7824 213 17 on on IN blog-dshr-org-7824 213 18 your -PRON- PRP$ blog-dshr-org-7824 213 19 device device NN blog-dshr-org-7824 213 20 . . . blog-dshr-org-7824 214 1 These these DT blog-dshr-org-7824 214 2 days day NNS blog-dshr-org-7824 214 3 , , , blog-dshr-org-7824 214 4 much much JJ blog-dshr-org-7824 214 5 of of IN blog-dshr-org-7824 214 6 the the DT blog-dshr-org-7824 214 7 software software NN blog-dshr-org-7824 214 8 that that WDT blog-dshr-org-7824 214 9 runs run VBZ blog-dshr-org-7824 214 10 on on IN blog-dshr-org-7824 214 11 your -PRON- PRP$ blog-dshr-org-7824 214 12 device device NN blog-dshr-org-7824 214 13 is be VBZ blog-dshr-org-7824 214 14 not not RB blog-dshr-org-7824 214 15 installed instal VBN blog-dshr-org-7824 214 16 , , , blog-dshr-org-7824 214 17 it -PRON- PRP blog-dshr-org-7824 214 18 is be VBZ blog-dshr-org-7824 214 19 delivered deliver VBN blog-dshr-org-7824 214 20 via via IN blog-dshr-org-7824 214 21 ad ad NN blog-dshr-org-7824 214 22 networks network NNS blog-dshr-org-7824 214 23 and and CC blog-dshr-org-7824 214 24 runs run VBZ blog-dshr-org-7824 214 25 inside inside IN blog-dshr-org-7824 214 26 your -PRON- PRP$ blog-dshr-org-7824 214 27 browser browser NN blog-dshr-org-7824 214 28 . . . blog-dshr-org-7824 215 1 As as IN blog-dshr-org-7824 215 2 blissex blissex NNP blog-dshr-org-7824 215 3 wrote write VBD blog-dshr-org-7824 215 4 in in IN blog-dshr-org-7824 215 5 this this DT blog-dshr-org-7824 215 6 comment comment NN blog-dshr-org-7824 215 7 , , , blog-dshr-org-7824 215 8 we -PRON- PRP blog-dshr-org-7824 215 9 are be VBP blog-dshr-org-7824 215 10 living live VBG blog-dshr-org-7824 215 11 : : : blog-dshr-org-7824 215 12 " " `` blog-dshr-org-7824 215 13 in in IN blog-dshr-org-7824 215 14 an an DT blog-dshr-org-7824 215 15 age age NN blog-dshr-org-7824 215 16 in in IN blog-dshr-org-7824 215 17 which which WDT blog-dshr-org-7824 215 18 every every DT blog-dshr-org-7824 215 19 browser browser NN blog-dshr-org-7824 215 20 gifts gift VBZ blog-dshr-org-7824 215 21 a a DT blog-dshr-org-7824 215 22 free free JJ blog-dshr-org-7824 215 23 - - HYPH blog-dshr-org-7824 215 24 to to IN blog-dshr-org-7824 215 25 - - HYPH blog-dshr-org-7824 215 26 use use NN blog-dshr-org-7824 215 27 , , , blog-dshr-org-7824 215 28 unlimited unlimited JJ blog-dshr-org-7824 215 29 - - HYPH blog-dshr-org-7824 215 30 usage usage NN blog-dshr-org-7824 215 31 , , , blog-dshr-org-7824 215 32 fast fast JJ blog-dshr-org-7824 215 33 VM VM NNP blog-dshr-org-7824 215 34 to to IN blog-dshr-org-7824 215 35 every every DT blog-dshr-org-7824 215 36 visited visit VBN blog-dshr-org-7824 215 37 web web NN blog-dshr-org-7824 215 38 site site NN blog-dshr-org-7824 215 39 , , , blog-dshr-org-7824 215 40 and and CC blog-dshr-org-7824 215 41 these these DT blog-dshr-org-7824 215 42 VMs vm NNS blog-dshr-org-7824 215 43 can can MD blog-dshr-org-7824 215 44 boot boot VB blog-dshr-org-7824 215 45 and and CC blog-dshr-org-7824 215 46 run run VB blog-dshr-org-7824 215 47 quite quite RB blog-dshr-org-7824 215 48 responsive responsive JJ blog-dshr-org-7824 215 49 3D 3d JJ blog-dshr-org-7824 215 50 games game NNS blog-dshr-org-7824 215 51 or or CC blog-dshr-org-7824 215 52 Linux Linux NNP blog-dshr-org-7824 215 53 distributions distribution NNS blog-dshr-org-7824 215 54 " " `` blog-dshr-org-7824 215 55 Ad ad NN blog-dshr-org-7824 215 56 blockers blocker NNS blog-dshr-org-7824 215 57 , , , blog-dshr-org-7824 215 58 essential essential JJ blog-dshr-org-7824 215 59 equipment equipment NN blog-dshr-org-7824 215 60 in in IN blog-dshr-org-7824 215 61 this this DT blog-dshr-org-7824 215 62 age age NN blog-dshr-org-7824 215 63 , , , blog-dshr-org-7824 215 64 merely merely RB blog-dshr-org-7824 215 65 reduce reduce VBP blog-dshr-org-7824 215 66 the the DT blog-dshr-org-7824 215 67 incidence incidence NN blog-dshr-org-7824 215 68 of of IN blog-dshr-org-7824 215 69 malware malware NNP blog-dshr-org-7824 215 70 delivered deliver VBN blog-dshr-org-7824 215 71 via via IN blog-dshr-org-7824 215 72 ad ad NN blog-dshr-org-7824 215 73 networks network NNS blog-dshr-org-7824 215 74 . . . blog-dshr-org-7824 216 1 Brannon Brannon NNP blog-dshr-org-7824 216 2 Dorsey Dorsey NNP blog-dshr-org-7824 216 3 's 's POS blog-dshr-org-7824 216 4 fascinating fascinating JJ blog-dshr-org-7824 216 5 experiments experiment NNS blog-dshr-org-7824 216 6 in in IN blog-dshr-org-7824 216 7 malvertising malvertising NN blog-dshr-org-7824 216 8 are be VBP blog-dshr-org-7824 216 9 described describe VBN blog-dshr-org-7824 216 10 by by IN blog-dshr-org-7824 216 11 Cory Cory NNP blog-dshr-org-7824 216 12 Doctorow Doctorow NNP blog-dshr-org-7824 216 13 thus thus RB blog-dshr-org-7824 216 14 : : : blog-dshr-org-7824 216 15 " " `` blog-dshr-org-7824 216 16 Anyone anyone NN blog-dshr-org-7824 216 17 can can MD blog-dshr-org-7824 216 18 make make VB blog-dshr-org-7824 216 19 an an DT blog-dshr-org-7824 216 20 account account NN blog-dshr-org-7824 216 21 , , , blog-dshr-org-7824 216 22 create create VB blog-dshr-org-7824 216 23 an an DT blog-dshr-org-7824 216 24 ad ad NN blog-dshr-org-7824 216 25 with with IN blog-dshr-org-7824 216 26 god god NNP blog-dshr-org-7824 216 27 - - HYPH blog-dshr-org-7824 216 28 knows knows NNP blog-dshr-org-7824 216 29 - - : blog-dshr-org-7824 216 30 what what WP blog-dshr-org-7824 216 31 Javascript Javascript NNP blog-dshr-org-7824 216 32 in in IN blog-dshr-org-7824 216 33 it -PRON- PRP blog-dshr-org-7824 216 34 , , , blog-dshr-org-7824 216 35 then then RB blog-dshr-org-7824 216 36 pay pay VB blog-dshr-org-7824 216 37 to to TO blog-dshr-org-7824 216 38 have have VB blog-dshr-org-7824 216 39 the the DT blog-dshr-org-7824 216 40 network network NN blog-dshr-org-7824 216 41 serve serve VB blog-dshr-org-7824 216 42 that that IN blog-dshr-org-7824 216 43 ad ad NN blog-dshr-org-7824 216 44 up up IN blog-dshr-org-7824 216 45 to to IN blog-dshr-org-7824 216 46 thousands thousand NNS blog-dshr-org-7824 216 47 of of IN blog-dshr-org-7824 216 48 browser browser NN blog-dshr-org-7824 216 49 . . . blog-dshr-org-7824 217 1 ... ... NFP blog-dshr-org-7824 218 1 Within within IN blog-dshr-org-7824 218 2 about about RB blog-dshr-org-7824 218 3 three three CD blog-dshr-org-7824 218 4 hours hour NNS blog-dshr-org-7824 218 5 , , , blog-dshr-org-7824 218 6 his -PRON- PRP$ blog-dshr-org-7824 218 7 code code NN blog-dshr-org-7824 218 8 ( ( -LRB- blog-dshr-org-7824 218 9 experimental experimental JJ blog-dshr-org-7824 218 10 , , , blog-dshr-org-7824 218 11 not not RB blog-dshr-org-7824 218 12 malicious malicious JJ blog-dshr-org-7824 218 13 , , , blog-dshr-org-7824 218 14 apart apart RB blog-dshr-org-7824 218 15 from from IN blog-dshr-org-7824 218 16 surreptitiously surreptitiously RB blog-dshr-org-7824 218 17 chewing chew VBG blog-dshr-org-7824 218 18 up up RP blog-dshr-org-7824 218 19 processing processing NN blog-dshr-org-7824 218 20 resources resource NNS blog-dshr-org-7824 218 21 ) ) -RRB- blog-dshr-org-7824 218 22 was be VBD blog-dshr-org-7824 218 23 running run VBG blog-dshr-org-7824 218 24 on on IN blog-dshr-org-7824 218 25 117,852 117,852 CD blog-dshr-org-7824 218 26 web web NN blog-dshr-org-7824 218 27 browsers browser NNS blog-dshr-org-7824 218 28 , , , blog-dshr-org-7824 218 29 on on IN blog-dshr-org-7824 218 30 30,234 30,234 CD blog-dshr-org-7824 218 31 unique unique JJ blog-dshr-org-7824 218 32 IP IP NNP blog-dshr-org-7824 218 33 addresses address NNS blog-dshr-org-7824 218 34 . . . blog-dshr-org-7824 219 1 Adtech Adtech NNP blog-dshr-org-7824 219 2 , , , blog-dshr-org-7824 219 3 it -PRON- PRP blog-dshr-org-7824 219 4 turns turn VBZ blog-dshr-org-7824 219 5 out out RP blog-dshr-org-7824 219 6 , , , blog-dshr-org-7824 219 7 is be VBZ blog-dshr-org-7824 219 8 a a DT blog-dshr-org-7824 219 9 superb superb JJ blog-dshr-org-7824 219 10 vector vector NN blog-dshr-org-7824 219 11 for for IN blog-dshr-org-7824 219 12 injecting inject VBG blog-dshr-org-7824 219 13 malware malware NN blog-dshr-org-7824 219 14 around around IN blog-dshr-org-7824 219 15 the the DT blog-dshr-org-7824 219 16 planet planet NN blog-dshr-org-7824 219 17 . . . blog-dshr-org-7824 220 1 Some some DT blog-dshr-org-7824 220 2 other other JJ blog-dshr-org-7824 220 3 fun fun JJ blog-dshr-org-7824 220 4 details detail NNS blog-dshr-org-7824 220 5 : : : blog-dshr-org-7824 220 6 Dorsey Dorsey NNP blog-dshr-org-7824 220 7 found find VBD blog-dshr-org-7824 220 8 that that IN blog-dshr-org-7824 220 9 when when WRB blog-dshr-org-7824 220 10 people people NNS blog-dshr-org-7824 220 11 loaded load VBD blog-dshr-org-7824 220 12 his -PRON- PRP$ blog-dshr-org-7824 220 13 ad ad NN blog-dshr-org-7824 220 14 , , , blog-dshr-org-7824 220 15 they -PRON- PRP blog-dshr-org-7824 220 16 left leave VBD blog-dshr-org-7824 220 17 the the DT blog-dshr-org-7824 220 18 tab tab NN blog-dshr-org-7824 220 19 open open VBP blog-dshr-org-7824 220 20 an an DT blog-dshr-org-7824 220 21 average average NN blog-dshr-org-7824 220 22 of of IN blog-dshr-org-7824 220 23 15 15 CD blog-dshr-org-7824 220 24 minutes minute NNS blog-dshr-org-7824 220 25 . . . blog-dshr-org-7824 221 1 That that DT blog-dshr-org-7824 221 2 gave give VBD blog-dshr-org-7824 221 3 him -PRON- PRP blog-dshr-org-7824 221 4 huge huge JJ blog-dshr-org-7824 221 5 amounts amount NNS blog-dshr-org-7824 221 6 of of IN blog-dshr-org-7824 221 7 compute compute JJ blog-dshr-org-7824 221 8 time time NN blog-dshr-org-7824 221 9 -- -- : blog-dshr-org-7824 221 10 327 327 CD blog-dshr-org-7824 221 11 full full JJ blog-dshr-org-7824 221 12 days day NNS blog-dshr-org-7824 221 13 , , , blog-dshr-org-7824 221 14 in in IN blog-dshr-org-7824 221 15 fact fact NN blog-dshr-org-7824 221 16 , , , blog-dshr-org-7824 221 17 for for IN blog-dshr-org-7824 221 18 about about RB blog-dshr-org-7824 221 19 $ $ $ blog-dshr-org-7824 221 20 15 15 CD blog-dshr-org-7824 221 21 in in IN blog-dshr-org-7824 221 22 ad ad NN blog-dshr-org-7824 221 23 purchase purchase NN blog-dshr-org-7824 221 24 . . . blog-dshr-org-7824 221 25 " " '' blog-dshr-org-7824 222 1 December December NNP blog-dshr-org-7824 222 2 22 22 CD blog-dshr-org-7824 222 3 , , , blog-dshr-org-7824 222 4 2018 2018 CD blog-dshr-org-7824 222 5 at at IN blog-dshr-org-7824 222 6 3:47 3:47 CD blog-dshr-org-7824 222 7 PM PM NNP blog-dshr-org-7824 222 8 David David NNP blog-dshr-org-7824 222 9 . . . blog-dshr-org-7824 223 1 said say VBD blog-dshr-org-7824 223 2 ... ... : blog-dshr-org-7824 224 1 I -PRON- PRP blog-dshr-org-7824 224 2 regret regret VBP blog-dshr-org-7824 224 3 not not RB blog-dshr-org-7824 224 4 citing cite VBG blog-dshr-org-7824 224 5 John John NNP blog-dshr-org-7824 224 6 Leyden Leyden NNP blog-dshr-org-7824 224 7 's 's POS blog-dshr-org-7824 224 8 Open open JJ blog-dshr-org-7824 224 9 - - HYPH blog-dshr-org-7824 224 10 source source NN blog-dshr-org-7824 224 11 software software NN blog-dshr-org-7824 224 12 supply supply NN blog-dshr-org-7824 224 13 chain chain NN blog-dshr-org-7824 224 14 vulns vuln NNS blog-dshr-org-7824 224 15 have have VBP blog-dshr-org-7824 224 16 doubled double VBN blog-dshr-org-7824 224 17 in in IN blog-dshr-org-7824 224 18 12 12 CD blog-dshr-org-7824 224 19 months month NNS blog-dshr-org-7824 224 20 to to TO blog-dshr-org-7824 224 21 illustrate illustrate VB blog-dshr-org-7824 224 22 the the DT blog-dshr-org-7824 224 23 scope scope NN blog-dshr-org-7824 224 24 of of IN blog-dshr-org-7824 224 25 the the DT blog-dshr-org-7824 224 26 problem problem NN blog-dshr-org-7824 224 27 : : : blog-dshr-org-7824 224 28 " " `` blog-dshr-org-7824 224 29 Miscreants miscreant NNS blog-dshr-org-7824 224 30 have have VBP blog-dshr-org-7824 224 31 even even RB blog-dshr-org-7824 224 32 started start VBN blog-dshr-org-7824 224 33 to to TO blog-dshr-org-7824 224 34 inject inject VB blog-dshr-org-7824 224 35 ( ( -LRB- blog-dshr-org-7824 224 36 or or CC blog-dshr-org-7824 224 37 mainline mainline JJ blog-dshr-org-7824 224 38 ) ) -RRB- blog-dshr-org-7824 224 39 vulnerabilities vulnerability NNS blog-dshr-org-7824 224 40 directly directly RB blog-dshr-org-7824 224 41 into into IN blog-dshr-org-7824 224 42 open open JJ blog-dshr-org-7824 224 43 source source NN blog-dshr-org-7824 224 44 projects project NNS blog-dshr-org-7824 224 45 , , , blog-dshr-org-7824 224 46 according accord VBG blog-dshr-org-7824 224 47 to to IN blog-dshr-org-7824 224 48 Sonatype Sonatype NNP blog-dshr-org-7824 224 49 , , , blog-dshr-org-7824 224 50 which which WDT blog-dshr-org-7824 224 51 cited cite VBD blog-dshr-org-7824 224 52 11 11 CD blog-dshr-org-7824 224 53 recent recent JJ blog-dshr-org-7824 224 54 examples example NNS blog-dshr-org-7824 224 55 of of IN blog-dshr-org-7824 224 56 this this DT blog-dshr-org-7824 224 57 type type NN blog-dshr-org-7824 224 58 of of IN blog-dshr-org-7824 224 59 malfeasance malfeasance NN blog-dshr-org-7824 224 60 in in IN blog-dshr-org-7824 224 61 its -PRON- PRP$ blog-dshr-org-7824 224 62 study study NN blog-dshr-org-7824 224 63 . . . blog-dshr-org-7824 225 1 El El NNP blog-dshr-org-7824 225 2 Reg Reg NNP blog-dshr-org-7824 225 3 has have VBZ blog-dshr-org-7824 225 4 reported report VBN blog-dshr-org-7824 225 5 on on IN blog-dshr-org-7824 225 6 several several JJ blog-dshr-org-7824 225 7 such such JJ blog-dshr-org-7824 225 8 incidents incident NNS blog-dshr-org-7824 225 9 including include VBG blog-dshr-org-7824 225 10 a a DT blog-dshr-org-7824 225 11 code code NN blog-dshr-org-7824 225 12 hack hack NN blog-dshr-org-7824 225 13 on on IN blog-dshr-org-7824 225 14 open open JJ blog-dshr-org-7824 225 15 - - HYPH blog-dshr-org-7824 225 16 source source NN blog-dshr-org-7824 225 17 utility utility NN blog-dshr-org-7824 225 18 eslint eslint NN blog-dshr-org-7824 225 19 - - HYPH blog-dshr-org-7824 225 20 scope scope NN blog-dshr-org-7824 225 21 back back RB blog-dshr-org-7824 225 22 in in IN blog-dshr-org-7824 225 23 July July NNP blog-dshr-org-7824 225 24 . . . blog-dshr-org-7824 225 25 " " '' blog-dshr-org-7824 226 1 and and CC blog-dshr-org-7824 226 2 : : : blog-dshr-org-7824 226 3 " " `` blog-dshr-org-7824 226 4 organisations organisation NNS blog-dshr-org-7824 226 5 are be VBP blog-dshr-org-7824 226 6 still still RB blog-dshr-org-7824 226 7 downloading download VBG blog-dshr-org-7824 226 8 vulnerable vulnerable JJ blog-dshr-org-7824 226 9 versions version NNS blog-dshr-org-7824 226 10 of of IN blog-dshr-org-7824 226 11 the the DT blog-dshr-org-7824 226 12 Apache Apache NNP blog-dshr-org-7824 226 13 Struts Struts NNP blog-dshr-org-7824 226 14 framework framework VBP blog-dshr-org-7824 226 15 at at IN blog-dshr-org-7824 226 16 much much RB blog-dshr-org-7824 226 17 the the DT blog-dshr-org-7824 226 18 same same JJ blog-dshr-org-7824 226 19 rate rate NN blog-dshr-org-7824 226 20 as as IN blog-dshr-org-7824 226 21 before before IN blog-dshr-org-7824 226 22 the the DT blog-dshr-org-7824 226 23 Equifax Equifax NNP blog-dshr-org-7824 226 24 data data NN blog-dshr-org-7824 226 25 breach breach NN blog-dshr-org-7824 226 26 , , , blog-dshr-org-7824 226 27 at at IN blog-dshr-org-7824 226 28 around around RB blog-dshr-org-7824 226 29 80,000 80,000 CD blog-dshr-org-7824 226 30 downloads download NNS blog-dshr-org-7824 226 31 per per IN blog-dshr-org-7824 226 32 month month NN blog-dshr-org-7824 226 33 . . . blog-dshr-org-7824 227 1 Downloads download NNS blog-dshr-org-7824 227 2 of of IN blog-dshr-org-7824 227 3 buggy buggy NN blog-dshr-org-7824 227 4 versions version NNS blog-dshr-org-7824 227 5 of of IN blog-dshr-org-7824 227 6 another another DT blog-dshr-org-7824 227 7 popular popular JJ blog-dshr-org-7824 227 8 web web NN blog-dshr-org-7824 227 9 application application NN blog-dshr-org-7824 227 10 framework framework NN blog-dshr-org-7824 227 11 called call VBN blog-dshr-org-7824 227 12 Spring Spring NNP blog-dshr-org-7824 227 13 were be VBD blog-dshr-org-7824 227 14 also also RB blog-dshr-org-7824 227 15 little little RB blog-dshr-org-7824 227 16 changed change VBN blog-dshr-org-7824 227 17 since since IN blog-dshr-org-7824 227 18 a a DT blog-dshr-org-7824 227 19 September September NNP blog-dshr-org-7824 227 20 2017 2017 CD blog-dshr-org-7824 227 21 vulnerability vulnerability NN blog-dshr-org-7824 227 22 , , , blog-dshr-org-7824 227 23 Sonatype Sonatype NNP blog-dshr-org-7824 227 24 added add VBD blog-dshr-org-7824 227 25 . . . blog-dshr-org-7824 228 1 The the DT blog-dshr-org-7824 228 2 85,000 85,000 CD blog-dshr-org-7824 228 3 average average NN blog-dshr-org-7824 228 4 in in IN blog-dshr-org-7824 228 5 September September NNP blog-dshr-org-7824 228 6 2017 2017 CD blog-dshr-org-7824 228 7 has have VBZ blog-dshr-org-7824 228 8 declined decline VBN blog-dshr-org-7824 228 9 only only RB blog-dshr-org-7824 228 10 15 15 CD blog-dshr-org-7824 228 11 per per NN blog-dshr-org-7824 228 12 cent cent NN blog-dshr-org-7824 228 13 to to IN blog-dshr-org-7824 228 14 72,000 72,000 CD blog-dshr-org-7824 228 15 over over IN blog-dshr-org-7824 228 16 the the DT blog-dshr-org-7824 228 17 last last JJ blog-dshr-org-7824 228 18 12 12 CD blog-dshr-org-7824 228 19 months month NNS blog-dshr-org-7824 228 20 . . . blog-dshr-org-7824 228 21 " " '' blog-dshr-org-7824 229 1 December December NNP blog-dshr-org-7824 229 2 24 24 CD blog-dshr-org-7824 229 3 , , , blog-dshr-org-7824 229 4 2018 2018 CD blog-dshr-org-7824 229 5 at at IN blog-dshr-org-7824 229 6 8:29 8:29 CD blog-dshr-org-7824 229 7 AM am NN blog-dshr-org-7824 229 8 David David NNP blog-dshr-org-7824 229 9 . . . blog-dshr-org-7824 230 1 said say VBD blog-dshr-org-7824 230 2 ... ... : blog-dshr-org-7824 230 3 Catalin Catalin NNP blog-dshr-org-7824 230 4 Cimpanu Cimpanu NNP blog-dshr-org-7824 230 5 's 's POS blog-dshr-org-7824 230 6 Users Users NNPS blog-dshr-org-7824 230 7 report report VBP blog-dshr-org-7824 230 8 losing lose VBG blog-dshr-org-7824 230 9 Bitcoin Bitcoin NNP blog-dshr-org-7824 230 10 in in IN blog-dshr-org-7824 230 11 clever clever JJ blog-dshr-org-7824 230 12 hack hack NN blog-dshr-org-7824 230 13 of of IN blog-dshr-org-7824 230 14 Electrum Electrum NNP blog-dshr-org-7824 230 15 wallets wallet NNS blog-dshr-org-7824 230 16 describes describe VBZ blog-dshr-org-7824 230 17 a a DT blog-dshr-org-7824 230 18 software software NN blog-dshr-org-7824 230 19 supply supply NN blog-dshr-org-7824 230 20 chain chain NN blog-dshr-org-7824 230 21 attack attack NN blog-dshr-org-7824 230 22 that that WDT blog-dshr-org-7824 230 23 started start VBD blog-dshr-org-7824 230 24 around around IN blog-dshr-org-7824 230 25 21st 21st JJ blog-dshr-org-7824 230 26 December December NNP blog-dshr-org-7824 230 27 and and CC blog-dshr-org-7824 230 28 netted net VBD blog-dshr-org-7824 230 29 around around IN blog-dshr-org-7824 230 30 $ $ $ blog-dshr-org-7824 230 31 750 750 CD blog-dshr-org-7824 230 32 K k NN blog-dshr-org-7824 230 33 " " '' blog-dshr-org-7824 230 34 worth worth JJ blog-dshr-org-7824 230 35 " " '' blog-dshr-org-7824 230 36 of of IN blog-dshr-org-7824 230 37 BTC BTC NNP blog-dshr-org-7824 230 38 . . . blog-dshr-org-7824 231 1 December December NNP blog-dshr-org-7824 231 2 27 27 CD blog-dshr-org-7824 231 3 , , , blog-dshr-org-7824 231 4 2018 2018 CD blog-dshr-org-7824 231 5 at at IN blog-dshr-org-7824 231 6 11:53 11:53 CD blog-dshr-org-7824 231 7 AM am NN blog-dshr-org-7824 231 8 David David NNP blog-dshr-org-7824 231 9 . . . blog-dshr-org-7824 232 1 said say VBD blog-dshr-org-7824 232 2 ... ... : blog-dshr-org-7824 232 3 Popular Popular NNP blog-dshr-org-7824 232 4 WordPress WordPress NNP blog-dshr-org-7824 232 5 plugin plugin NN blog-dshr-org-7824 232 6 hacked hack VBN blog-dshr-org-7824 232 7 by by IN blog-dshr-org-7824 232 8 angry angry JJ blog-dshr-org-7824 232 9 former former JJ blog-dshr-org-7824 232 10 employee employee NN blog-dshr-org-7824 232 11 is be VBZ blog-dshr-org-7824 232 12 like like IN blog-dshr-org-7824 232 13 the the DT blog-dshr-org-7824 232 14 event event NN blog-dshr-org-7824 232 15 - - HYPH blog-dshr-org-7824 232 16 stream stream NN blog-dshr-org-7824 232 17 hack hack NN blog-dshr-org-7824 232 18 in in IN blog-dshr-org-7824 232 19 that that DT blog-dshr-org-7824 232 20 no no DT blog-dshr-org-7824 232 21 amount amount NN blog-dshr-org-7824 232 22 of of IN blog-dshr-org-7824 232 23 transparency transparency NN blog-dshr-org-7824 232 24 would would MD blog-dshr-org-7824 232 25 have have VB blog-dshr-org-7824 232 26 prevented prevent VBN blog-dshr-org-7824 232 27 it -PRON- PRP blog-dshr-org-7824 232 28 . . . blog-dshr-org-7824 233 1 The the DT blog-dshr-org-7824 233 2 disgruntled disgruntled JJ blog-dshr-org-7824 233 3 perpetrator perpetrator NN blog-dshr-org-7824 233 4 apparently apparently RB blog-dshr-org-7824 233 5 had have VBD blog-dshr-org-7824 233 6 valid valid JJ blog-dshr-org-7824 233 7 credentials credential NNS blog-dshr-org-7824 233 8 for for IN blog-dshr-org-7824 233 9 the the DT blog-dshr-org-7824 233 10 official official JJ blog-dshr-org-7824 233 11 source source NN blog-dshr-org-7824 233 12 of of IN blog-dshr-org-7824 233 13 the the DT blog-dshr-org-7824 233 14 software software NN blog-dshr-org-7824 233 15 : : : blog-dshr-org-7824 233 16 " " `` blog-dshr-org-7824 233 17 The the DT blog-dshr-org-7824 233 18 plugin plugin NN blog-dshr-org-7824 233 19 in in IN blog-dshr-org-7824 233 20 question question NN blog-dshr-org-7824 233 21 is be VBZ blog-dshr-org-7824 233 22 WPML WPML NNP blog-dshr-org-7824 233 23 ( ( -LRB- blog-dshr-org-7824 233 24 or or CC blog-dshr-org-7824 233 25 WP WP NNP blog-dshr-org-7824 233 26 MultiLingual MultiLingual NNP blog-dshr-org-7824 233 27 ) ) -RRB- blog-dshr-org-7824 233 28 , , , blog-dshr-org-7824 233 29 the the DT blog-dshr-org-7824 233 30 most most RBS blog-dshr-org-7824 233 31 popular popular JJ blog-dshr-org-7824 233 32 WordPress WordPress NNP blog-dshr-org-7824 233 33 plugin plugin NN blog-dshr-org-7824 233 34 for for IN blog-dshr-org-7824 233 35 translating translate VBG blog-dshr-org-7824 233 36 and and CC blog-dshr-org-7824 233 37 serving serve VBG blog-dshr-org-7824 233 38 WordPress WordPress NNP blog-dshr-org-7824 233 39 sites site NNS blog-dshr-org-7824 233 40 in in IN blog-dshr-org-7824 233 41 multiple multiple JJ blog-dshr-org-7824 233 42 languages language NNS blog-dshr-org-7824 233 43 . . . blog-dshr-org-7824 234 1 According accord VBG blog-dshr-org-7824 234 2 to to IN blog-dshr-org-7824 234 3 its -PRON- PRP$ blog-dshr-org-7824 234 4 website website NN blog-dshr-org-7824 234 5 , , , blog-dshr-org-7824 234 6 WPML WPML NNP blog-dshr-org-7824 234 7 has have VBZ blog-dshr-org-7824 234 8 over over IN blog-dshr-org-7824 234 9 600,000 600,000 CD blog-dshr-org-7824 234 10 paying pay VBG blog-dshr-org-7824 234 11 customers customer NNS blog-dshr-org-7824 234 12 and and CC blog-dshr-org-7824 234 13 is be VBZ blog-dshr-org-7824 234 14 one one CD blog-dshr-org-7824 234 15 of of IN blog-dshr-org-7824 234 16 the the DT blog-dshr-org-7824 234 17 very very RB blog-dshr-org-7824 234 18 few few JJ blog-dshr-org-7824 234 19 WordPress WordPress NNP blog-dshr-org-7824 234 20 plugins plugin NNS blog-dshr-org-7824 234 21 that that WDT blog-dshr-org-7824 234 22 is be VBZ blog-dshr-org-7824 234 23 so so RB blog-dshr-org-7824 234 24 reputable reputable JJ blog-dshr-org-7824 234 25 that that IN blog-dshr-org-7824 234 26 it -PRON- PRP blog-dshr-org-7824 234 27 does do VBZ blog-dshr-org-7824 234 28 n't not RB blog-dshr-org-7824 234 29 need need VB blog-dshr-org-7824 234 30 to to TO blog-dshr-org-7824 234 31 advertise advertise VB blog-dshr-org-7824 234 32 itself -PRON- PRP blog-dshr-org-7824 234 33 with with IN blog-dshr-org-7824 234 34 a a DT blog-dshr-org-7824 234 35 free free JJ blog-dshr-org-7824 234 36 version version NN blog-dshr-org-7824 234 37 on on IN blog-dshr-org-7824 234 38 the the DT blog-dshr-org-7824 234 39 official official JJ blog-dshr-org-7824 234 40 WordPress.org WordPress.org -LRB- blog-dshr-org-7824 234 41 plugins plugin NNS blog-dshr-org-7824 234 42 repository repository NN blog-dshr-org-7824 234 43 . . . blog-dshr-org-7824 234 44 " " '' blog-dshr-org-7824 235 1 January January NNP blog-dshr-org-7824 235 2 21 21 CD blog-dshr-org-7824 235 3 , , , blog-dshr-org-7824 235 4 2019 2019 CD blog-dshr-org-7824 235 5 at at IN blog-dshr-org-7824 235 6 6:20 6:20 CD blog-dshr-org-7824 235 7 AM am NN blog-dshr-org-7824 235 8 David David NNP blog-dshr-org-7824 235 9 . . . blog-dshr-org-7824 236 1 said say VBD blog-dshr-org-7824 236 2 ... ... : blog-dshr-org-7824 237 1 The the DT blog-dshr-org-7824 237 2 fourth fourth JJ blog-dshr-org-7824 237 3 annual annual JJ blog-dshr-org-7824 237 4 report report NN blog-dshr-org-7824 237 5 for for IN blog-dshr-org-7824 237 6 the the DT blog-dshr-org-7824 237 7 National National NNP blog-dshr-org-7824 237 8 Security Security NNP blog-dshr-org-7824 237 9 Adviser Adviser NNP blog-dshr-org-7824 237 10 from from IN blog-dshr-org-7824 237 11 the the DT blog-dshr-org-7824 237 12 Huawei Huawei NNP blog-dshr-org-7824 237 13 Cyber Cyber NNP blog-dshr-org-7824 237 14 Security Security NNP blog-dshr-org-7824 237 15 Evaluation Evaluation NNP blog-dshr-org-7824 237 16 Centre Centre NNP blog-dshr-org-7824 237 17 Oversight Oversight NNP blog-dshr-org-7824 237 18 Board Board NNP blog-dshr-org-7824 237 19 in in IN blog-dshr-org-7824 237 20 the the DT blog-dshr-org-7824 237 21 UK UK NNP blog-dshr-org-7824 237 22 is be VBZ blog-dshr-org-7824 237 23 interesting interesting JJ blog-dshr-org-7824 237 24 . . . blog-dshr-org-7824 238 1 The the DT blog-dshr-org-7824 238 2 Centre Centre NNP blog-dshr-org-7824 238 3 has have VBZ blog-dshr-org-7824 238 4 access access NN blog-dshr-org-7824 238 5 to to IN blog-dshr-org-7824 238 6 the the DT blog-dshr-org-7824 238 7 source source NN blog-dshr-org-7824 238 8 code code NN blog-dshr-org-7824 238 9 for for IN blog-dshr-org-7824 238 10 Huawei Huawei NNP blog-dshr-org-7824 238 11 products product NNS blog-dshr-org-7824 238 12 , , , blog-dshr-org-7824 238 13 and and CC blog-dshr-org-7824 238 14 is be VBZ blog-dshr-org-7824 238 15 working work VBG blog-dshr-org-7824 238 16 with with IN blog-dshr-org-7824 238 17 Huawei Huawei NNP blog-dshr-org-7824 238 18 to to TO blog-dshr-org-7824 238 19 make make VB blog-dshr-org-7824 238 20 the the DT blog-dshr-org-7824 238 21 builds build NNS blog-dshr-org-7824 238 22 reproducible reproducible VB blog-dshr-org-7824 238 23 : : : blog-dshr-org-7824 238 24 " " `` blog-dshr-org-7824 238 25 3.15 3.15 CD blog-dshr-org-7824 238 26 HCSEC HCSEC NNS blog-dshr-org-7824 238 27 have have VBP blog-dshr-org-7824 238 28 worked work VBN blog-dshr-org-7824 238 29 with with IN blog-dshr-org-7824 238 30 Huawei Huawei NNP blog-dshr-org-7824 238 31 R&D R&D NNP blog-dshr-org-7824 238 32 to to TO blog-dshr-org-7824 238 33 try try VB blog-dshr-org-7824 238 34 to to TO blog-dshr-org-7824 238 35 correct correct VB blog-dshr-org-7824 238 36 the the DT blog-dshr-org-7824 238 37 deficiencies deficiency NNS blog-dshr-org-7824 238 38 in in IN blog-dshr-org-7824 238 39 the the DT blog-dshr-org-7824 238 40 underlying underlying JJ blog-dshr-org-7824 238 41 build build NN blog-dshr-org-7824 238 42 and and CC blog-dshr-org-7824 238 43 compilation compilation NN blog-dshr-org-7824 238 44 process process NN blog-dshr-org-7824 238 45 for for IN blog-dshr-org-7824 238 46 these these DT blog-dshr-org-7824 238 47 four four CD blog-dshr-org-7824 238 48 products product NNS blog-dshr-org-7824 238 49 . . . blog-dshr-org-7824 239 1 This this DT blog-dshr-org-7824 239 2 has have VBZ blog-dshr-org-7824 239 3 taken take VBN blog-dshr-org-7824 239 4 significant significant JJ blog-dshr-org-7824 239 5 effort effort NN blog-dshr-org-7824 239 6 from from IN blog-dshr-org-7824 239 7 all all DT blog-dshr-org-7824 239 8 sides side NNS blog-dshr-org-7824 239 9 and and CC blog-dshr-org-7824 239 10 has have VBZ blog-dshr-org-7824 239 11 resulted result VBN blog-dshr-org-7824 239 12 in in IN blog-dshr-org-7824 239 13 a a DT blog-dshr-org-7824 239 14 single single JJ blog-dshr-org-7824 239 15 product product NN blog-dshr-org-7824 239 16 that that WDT blog-dshr-org-7824 239 17 can can MD blog-dshr-org-7824 239 18 be be VB blog-dshr-org-7824 239 19 built build VBN blog-dshr-org-7824 239 20 repeatedly repeatedly RB blog-dshr-org-7824 239 21 from from IN blog-dshr-org-7824 239 22 source source NN blog-dshr-org-7824 239 23 to to IN blog-dshr-org-7824 239 24 the the DT blog-dshr-org-7824 239 25 General General NNP blog-dshr-org-7824 239 26 Availability Availability NNP blog-dshr-org-7824 239 27 ( ( -LRB- blog-dshr-org-7824 239 28 GA GA NNP blog-dshr-org-7824 239 29 ) ) -RRB- blog-dshr-org-7824 239 30 version version NN blog-dshr-org-7824 239 31 as as IN blog-dshr-org-7824 239 32 distributed distribute VBN blog-dshr-org-7824 239 33 . . . blog-dshr-org-7824 240 1 This this DT blog-dshr-org-7824 240 2 particular particular JJ blog-dshr-org-7824 240 3 build build NN blog-dshr-org-7824 240 4 has have VBZ blog-dshr-org-7824 240 5 yet yet RB blog-dshr-org-7824 240 6 to to TO blog-dshr-org-7824 240 7 be be VB blog-dshr-org-7824 240 8 deployed deploy VBN blog-dshr-org-7824 240 9 by by IN blog-dshr-org-7824 240 10 any any DT blog-dshr-org-7824 240 11 UK UK NNP blog-dshr-org-7824 240 12 operator operator NN blog-dshr-org-7824 240 13 , , , blog-dshr-org-7824 240 14 but but CC blog-dshr-org-7824 240 15 we -PRON- PRP blog-dshr-org-7824 240 16 expect expect VBP blog-dshr-org-7824 240 17 deployment deployment NN blog-dshr-org-7824 240 18 by by IN blog-dshr-org-7824 240 19 UK UK NNP blog-dshr-org-7824 240 20 operators operator NNS blog-dshr-org-7824 240 21 in in IN blog-dshr-org-7824 240 22 the the DT blog-dshr-org-7824 240 23 future future NN blog-dshr-org-7824 240 24 , , , blog-dshr-org-7824 240 25 as as IN blog-dshr-org-7824 240 26 part part NN blog-dshr-org-7824 240 27 of of IN blog-dshr-org-7824 240 28 their -PRON- PRP$ blog-dshr-org-7824 240 29 normal normal JJ blog-dshr-org-7824 240 30 network network NN blog-dshr-org-7824 240 31 release release NN blog-dshr-org-7824 240 32 cycle cycle NN blog-dshr-org-7824 240 33 . . . blog-dshr-org-7824 241 1 The the DT blog-dshr-org-7824 241 2 remaining remain VBG blog-dshr-org-7824 241 3 three three CD blog-dshr-org-7824 241 4 products product NNS blog-dshr-org-7824 241 5 from from IN blog-dshr-org-7824 241 6 the the DT blog-dshr-org-7824 241 7 pilot pilot NN blog-dshr-org-7824 241 8 are be VBP blog-dshr-org-7824 241 9 expected expect VBN blog-dshr-org-7824 241 10 to to TO blog-dshr-org-7824 241 11 be be VB blog-dshr-org-7824 241 12 made make VBN blog-dshr-org-7824 241 13 commercially commercially RB blog-dshr-org-7824 241 14 available available JJ blog-dshr-org-7824 241 15 in in IN blog-dshr-org-7824 241 16 2018H1 2018h1 CD blog-dshr-org-7824 241 17 , , , blog-dshr-org-7824 241 18 with with IN blog-dshr-org-7824 241 19 each each DT blog-dshr-org-7824 241 20 having have VBG blog-dshr-org-7824 241 21 reproducible reproducible NN blog-dshr-org-7824 241 22 binaries binary NNS blog-dshr-org-7824 241 23 . . . blog-dshr-org-7824 241 24 " " '' blog-dshr-org-7824 242 1 January January NNP blog-dshr-org-7824 242 2 31 31 CD blog-dshr-org-7824 242 3 , , , blog-dshr-org-7824 242 4 2019 2019 CD blog-dshr-org-7824 242 5 at at IN blog-dshr-org-7824 242 6 8:47 8:47 CD blog-dshr-org-7824 242 7 AM am NN blog-dshr-org-7824 242 8 David David NNP blog-dshr-org-7824 242 9 . . . blog-dshr-org-7824 243 1 said say VBD blog-dshr-org-7824 243 2 ... ... : blog-dshr-org-7824 243 3 Huawei Huawei NNP blog-dshr-org-7824 243 4 says say VBZ blog-dshr-org-7824 243 5 fixing fix VBG blog-dshr-org-7824 243 6 " " `` blog-dshr-org-7824 243 7 the the DT blog-dshr-org-7824 243 8 deficiencies deficiency NNS blog-dshr-org-7824 243 9 in in IN blog-dshr-org-7824 243 10 the the DT blog-dshr-org-7824 243 11 underlying underlying JJ blog-dshr-org-7824 243 12 build build NN blog-dshr-org-7824 243 13 and and CC blog-dshr-org-7824 243 14 compilation compilation NN blog-dshr-org-7824 243 15 process process NN blog-dshr-org-7824 243 16 " " '' blog-dshr-org-7824 243 17 in in IN blog-dshr-org-7824 243 18 its -PRON- PRP$ blog-dshr-org-7824 243 19 carrier carrier NN blog-dshr-org-7824 243 20 products product NNS blog-dshr-org-7824 243 21 will will MD blog-dshr-org-7824 243 22 take take VB blog-dshr-org-7824 243 23 five five CD blog-dshr-org-7824 243 24 years year NNS blog-dshr-org-7824 243 25 . . . blog-dshr-org-7824 244 1 February February NNP blog-dshr-org-7824 244 2 6 6 CD blog-dshr-org-7824 244 3 , , , blog-dshr-org-7824 244 4 2019 2019 CD blog-dshr-org-7824 244 5 at at IN blog-dshr-org-7824 244 6 7:17 7:17 CD blog-dshr-org-7824 244 7 PM PM NNP blog-dshr-org-7824 244 8 David David NNP blog-dshr-org-7824 244 9 . . . blog-dshr-org-7824 245 1 said say VBD blog-dshr-org-7824 245 2 ... ... : blog-dshr-org-7824 246 1 In in IN blog-dshr-org-7824 246 2 Cyber Cyber NNP blog-dshr-org-7824 246 3 - - HYPH blog-dshr-org-7824 246 4 Mercenary Mercenary NNP blog-dshr-org-7824 246 5 Groups group NNS blog-dshr-org-7824 246 6 Should Should MD blog-dshr-org-7824 246 7 n't not RB blog-dshr-org-7824 246 8 be be VB blog-dshr-org-7824 246 9 Trusted trust VBN blog-dshr-org-7824 246 10 in in IN blog-dshr-org-7824 246 11 Your -PRON- PRP$ blog-dshr-org-7824 246 12 Browser Browser NNP blog-dshr-org-7824 246 13 or or CC blog-dshr-org-7824 246 14 Anywhere Anywhere NNP blog-dshr-org-7824 246 15 Else Else NNP blog-dshr-org-7824 246 16 , , , blog-dshr-org-7824 246 17 the the DT blog-dshr-org-7824 246 18 EFF EFF NNP blog-dshr-org-7824 246 19 's 's POS blog-dshr-org-7824 246 20 Cooper Cooper NNP blog-dshr-org-7824 246 21 Quintin Quintin NNP blog-dshr-org-7824 246 22 describes describe VBZ blog-dshr-org-7824 246 23 the the DT blog-dshr-org-7824 246 24 latest late JJS blog-dshr-org-7824 246 25 example example NN blog-dshr-org-7824 246 26 showing show VBG blog-dshr-org-7824 246 27 why why WRB blog-dshr-org-7824 246 28 Certificate Certificate NNP blog-dshr-org-7824 246 29 Authorities Authorities NNPS blog-dshr-org-7824 246 30 ca can MD blog-dshr-org-7824 246 31 n't not RB blog-dshr-org-7824 246 32 be be VB blog-dshr-org-7824 246 33 trusted trust VBN blog-dshr-org-7824 246 34 : : : blog-dshr-org-7824 246 35 " " `` blog-dshr-org-7824 246 36 DarkMatter DarkMatter NNP blog-dshr-org-7824 246 37 , , , blog-dshr-org-7824 246 38 the the DT blog-dshr-org-7824 246 39 notorious notorious JJ blog-dshr-org-7824 246 40 cyber cyber JJ blog-dshr-org-7824 246 41 - - HYPH blog-dshr-org-7824 246 42 mercenary mercenary NN blog-dshr-org-7824 246 43 firm firm NN blog-dshr-org-7824 246 44 based base VBN blog-dshr-org-7824 246 45 in in IN blog-dshr-org-7824 246 46 the the DT blog-dshr-org-7824 246 47 United United NNP blog-dshr-org-7824 246 48 Arab Arab NNP blog-dshr-org-7824 246 49 Emirates Emirates NNP blog-dshr-org-7824 246 50 , , , blog-dshr-org-7824 246 51 is be VBZ blog-dshr-org-7824 246 52 seeking seek VBG blog-dshr-org-7824 246 53 to to TO blog-dshr-org-7824 246 54 become become VB blog-dshr-org-7824 246 55 approved approve VBN blog-dshr-org-7824 246 56 as as IN blog-dshr-org-7824 246 57 a a DT blog-dshr-org-7824 246 58 top top JJ blog-dshr-org-7824 246 59 - - HYPH blog-dshr-org-7824 246 60 level level NN blog-dshr-org-7824 246 61 certificate certificate NN blog-dshr-org-7824 246 62 authority authority NN blog-dshr-org-7824 246 63 in in IN blog-dshr-org-7824 246 64 Mozilla Mozilla NNP blog-dshr-org-7824 246 65 ’s ’s POS blog-dshr-org-7824 246 66 root root NN blog-dshr-org-7824 246 67 certificate certificate NN blog-dshr-org-7824 246 68 program program NN blog-dshr-org-7824 246 69 . . . blog-dshr-org-7824 247 1 Giving give VBG blog-dshr-org-7824 247 2 such such PDT blog-dshr-org-7824 247 3 a a DT blog-dshr-org-7824 247 4 trusted trust VBN blog-dshr-org-7824 247 5 position position NN blog-dshr-org-7824 247 6 to to IN blog-dshr-org-7824 247 7 this this DT blog-dshr-org-7824 247 8 company company NN blog-dshr-org-7824 247 9 would would MD blog-dshr-org-7824 247 10 be be VB blog-dshr-org-7824 247 11 a a DT blog-dshr-org-7824 247 12 very very RB blog-dshr-org-7824 247 13 bad bad JJ blog-dshr-org-7824 247 14 idea idea NN blog-dshr-org-7824 247 15 . . . blog-dshr-org-7824 248 1 DarkMatter DarkMatter NNP blog-dshr-org-7824 248 2 has have VBZ blog-dshr-org-7824 248 3 a a DT blog-dshr-org-7824 248 4 business business NN blog-dshr-org-7824 248 5 interest interest NN blog-dshr-org-7824 248 6 in in IN blog-dshr-org-7824 248 7 subverting subverting NN blog-dshr-org-7824 248 8 encryption encryption NN blog-dshr-org-7824 248 9 , , , blog-dshr-org-7824 248 10 and and CC blog-dshr-org-7824 248 11 would would MD blog-dshr-org-7824 248 12 be be VB blog-dshr-org-7824 248 13 able able JJ blog-dshr-org-7824 248 14 to to TO blog-dshr-org-7824 248 15 potentially potentially RB blog-dshr-org-7824 248 16 decrypt decrypt VB blog-dshr-org-7824 248 17 any any DT blog-dshr-org-7824 248 18 HTTPS HTTPS NNP blog-dshr-org-7824 248 19 traffic traffic NN blog-dshr-org-7824 248 20 they -PRON- PRP blog-dshr-org-7824 248 21 intercepted intercept VBD blog-dshr-org-7824 248 22 . . . blog-dshr-org-7824 249 1 One one CD blog-dshr-org-7824 249 2 of of IN blog-dshr-org-7824 249 3 the the DT blog-dshr-org-7824 249 4 things thing NNS blog-dshr-org-7824 249 5 HTTPS HTTPS NNP blog-dshr-org-7824 249 6 is be VBZ blog-dshr-org-7824 249 7 good good JJ blog-dshr-org-7824 249 8 at at IN blog-dshr-org-7824 249 9 is be VBZ blog-dshr-org-7824 249 10 protecting protect VBG blog-dshr-org-7824 249 11 your -PRON- PRP$ blog-dshr-org-7824 249 12 private private JJ blog-dshr-org-7824 249 13 communications communication NNS blog-dshr-org-7824 249 14 from from IN blog-dshr-org-7824 249 15 snooping snoop VBG blog-dshr-org-7824 249 16 governments government NNS blog-dshr-org-7824 249 17 — — : blog-dshr-org-7824 249 18 and and CC blog-dshr-org-7824 249 19 when when WRB blog-dshr-org-7824 249 20 governments government NNS blog-dshr-org-7824 249 21 want want VBP blog-dshr-org-7824 249 22 to to TO blog-dshr-org-7824 249 23 snoop snoop VB blog-dshr-org-7824 249 24 , , , blog-dshr-org-7824 249 25 they -PRON- PRP blog-dshr-org-7824 249 26 regularly regularly RB blog-dshr-org-7824 249 27 hire hire VBP blog-dshr-org-7824 249 28 DarkMatter DarkMatter NNP blog-dshr-org-7824 249 29 to to TO blog-dshr-org-7824 249 30 do do VB blog-dshr-org-7824 249 31 their -PRON- PRP$ blog-dshr-org-7824 249 32 dirty dirty JJ blog-dshr-org-7824 249 33 work work NN blog-dshr-org-7824 249 34 . . . blog-dshr-org-7824 250 1 ... ... NFP blog-dshr-org-7824 250 2 DarkMatter DarkMatter NNP blog-dshr-org-7824 250 3 was be VBD blog-dshr-org-7824 250 4 already already RB blog-dshr-org-7824 250 5 given give VBN blog-dshr-org-7824 250 6 an an DT blog-dshr-org-7824 250 7 " " `` blog-dshr-org-7824 250 8 intermediate intermediate JJ blog-dshr-org-7824 250 9 " " '' blog-dshr-org-7824 250 10 certificate certificate NN blog-dshr-org-7824 250 11 by by IN blog-dshr-org-7824 250 12 another another DT blog-dshr-org-7824 250 13 company company NN blog-dshr-org-7824 250 14 , , , blog-dshr-org-7824 250 15 called call VBN blog-dshr-org-7824 250 16 QuoVadis QuoVadis NNP blog-dshr-org-7824 250 17 , , , blog-dshr-org-7824 250 18 now now RB blog-dshr-org-7824 250 19 owned own VBN blog-dshr-org-7824 250 20 by by IN blog-dshr-org-7824 250 21 DigiCert DigiCert NNP blog-dshr-org-7824 250 22 . . . blog-dshr-org-7824 251 1 That that DT blog-dshr-org-7824 251 2 's be VBZ blog-dshr-org-7824 251 3 bad bad JJ blog-dshr-org-7824 251 4 enough enough RB blog-dshr-org-7824 251 5 , , , blog-dshr-org-7824 251 6 but but CC blog-dshr-org-7824 251 7 the the DT blog-dshr-org-7824 251 8 " " `` blog-dshr-org-7824 251 9 intermediate intermediate JJ blog-dshr-org-7824 251 10 " " '' blog-dshr-org-7824 251 11 authority authority NN blog-dshr-org-7824 251 12 at at IN blog-dshr-org-7824 251 13 least least JJS blog-dshr-org-7824 251 14 comes come VBZ blog-dshr-org-7824 251 15 with with IN blog-dshr-org-7824 251 16 ostensible ostensible JJ blog-dshr-org-7824 251 17 oversight oversight NN blog-dshr-org-7824 251 18 by by IN blog-dshr-org-7824 251 19 DigiCert DigiCert NNP blog-dshr-org-7824 251 20 . . . blog-dshr-org-7824 251 21 " " '' blog-dshr-org-7824 252 1 Hat hat NN blog-dshr-org-7824 252 2 tip tip NN blog-dshr-org-7824 252 3 to to IN blog-dshr-org-7824 252 4 Cory Cory NNP blog-dshr-org-7824 252 5 Doctorow Doctorow NNP blog-dshr-org-7824 252 6 . . . blog-dshr-org-7824 253 1 February February NNP blog-dshr-org-7824 253 2 23 23 CD blog-dshr-org-7824 253 3 , , , blog-dshr-org-7824 253 4 2019 2019 CD blog-dshr-org-7824 253 5 at at IN blog-dshr-org-7824 253 6 2:29 2:29 CD blog-dshr-org-7824 253 7 PM pm NN blog-dshr-org-7824 253 8 David David NNP blog-dshr-org-7824 253 9 . . . blog-dshr-org-7824 254 1 said say VBD blog-dshr-org-7824 254 2 ... ... : blog-dshr-org-7824 254 3 Gareth Gareth NNP blog-dshr-org-7824 254 4 Corfield Corfield NNP blog-dshr-org-7824 254 5 's 's POS blog-dshr-org-7824 254 6 Just Just NNP blog-dshr-org-7824 254 7 Android Android NNP blog-dshr-org-7824 254 8 things thing NNS blog-dshr-org-7824 254 9 : : : blog-dshr-org-7824 254 10 150 150 CD blog-dshr-org-7824 254 11 m m NN blog-dshr-org-7824 254 12 phones phone NNS blog-dshr-org-7824 254 13 , , , blog-dshr-org-7824 254 14 gadgets gadget VBZ blog-dshr-org-7824 254 15 installed instal VBN blog-dshr-org-7824 254 16 ' ' '' blog-dshr-org-7824 254 17 adware adware VB blog-dshr-org-7824 254 18 - - HYPH blog-dshr-org-7824 254 19 ridden ridden JJ blog-dshr-org-7824 254 20 ' ' '' blog-dshr-org-7824 254 21 mobe mobe NNP blog-dshr-org-7824 254 22 simulator simulator NNP blog-dshr-org-7824 254 23 games games NNPS blog-dshr-org-7824 254 24 reports report VBZ blog-dshr-org-7824 254 25 on on IN blog-dshr-org-7824 254 26 a a DT blog-dshr-org-7824 254 27 very very RB blog-dshr-org-7824 254 28 successful successful JJ blog-dshr-org-7824 254 29 software software NN blog-dshr-org-7824 254 30 supply supply NN blog-dshr-org-7824 254 31 chain chain NN blog-dshr-org-7824 254 32 attack attack NN blog-dshr-org-7824 254 33 : : : blog-dshr-org-7824 254 34 " " `` blog-dshr-org-7824 254 35 Android Android NNP blog-dshr-org-7824 254 36 adware adware VBP blog-dshr-org-7824 254 37 found find VBD blog-dshr-org-7824 254 38 its -PRON- PRP$ blog-dshr-org-7824 254 39 way way NN blog-dshr-org-7824 254 40 into into IN blog-dshr-org-7824 254 41 as as RB blog-dshr-org-7824 254 42 many many JJ blog-dshr-org-7824 254 43 as as IN blog-dshr-org-7824 254 44 150 150 CD blog-dshr-org-7824 254 45 million million CD blog-dshr-org-7824 254 46 devices device NNS blog-dshr-org-7824 254 47 – – : blog-dshr-org-7824 254 48 after after IN blog-dshr-org-7824 254 49 it -PRON- PRP blog-dshr-org-7824 254 50 was be VBD blog-dshr-org-7824 254 51 stashed stash VBN blog-dshr-org-7824 254 52 inside inside IN blog-dshr-org-7824 254 53 a a DT blog-dshr-org-7824 254 54 large large JJ blog-dshr-org-7824 254 55 number number NN blog-dshr-org-7824 254 56 of of IN blog-dshr-org-7824 254 57 those those DT blog-dshr-org-7824 254 58 bizarre bizarre JJ blog-dshr-org-7824 254 59 viral viral JJ blog-dshr-org-7824 254 60 mundane mundane JJ blog-dshr-org-7824 254 61 job job NN blog-dshr-org-7824 254 62 simulation simulation NN blog-dshr-org-7824 254 63 games game NNS blog-dshr-org-7824 254 64 , , , blog-dshr-org-7824 254 65 we -PRON- PRP blog-dshr-org-7824 254 66 're be VBP blog-dshr-org-7824 254 67 told tell VBN blog-dshr-org-7824 254 68 . . . blog-dshr-org-7824 255 1 ... ... NFP blog-dshr-org-7824 256 1 Although although IN blog-dshr-org-7824 256 2 researchers researcher NNS blog-dshr-org-7824 256 3 believed believe VBD blog-dshr-org-7824 256 4 that that IN blog-dshr-org-7824 256 5 the the DT blog-dshr-org-7824 256 6 titles title NNS blog-dshr-org-7824 256 7 were be VBD blog-dshr-org-7824 256 8 legitimate legitimate JJ blog-dshr-org-7824 256 9 , , , blog-dshr-org-7824 256 10 they -PRON- PRP blog-dshr-org-7824 256 11 said say VBD blog-dshr-org-7824 256 12 they -PRON- PRP blog-dshr-org-7824 256 13 thought think VBD blog-dshr-org-7824 256 14 the the DT blog-dshr-org-7824 256 15 devs dev NNS blog-dshr-org-7824 256 16 were be VBD blog-dshr-org-7824 256 17 “ " `` blog-dshr-org-7824 256 18 scammed scammed JJ blog-dshr-org-7824 256 19 ” " '' blog-dshr-org-7824 256 20 into into IN blog-dshr-org-7824 256 21 using use VBG blog-dshr-org-7824 256 22 a a DT blog-dshr-org-7824 256 23 “ " `` blog-dshr-org-7824 256 24 malicious malicious JJ blog-dshr-org-7824 256 25 SDK SDK NNP blog-dshr-org-7824 256 26 , , , blog-dshr-org-7824 256 27 unaware unaware JJ blog-dshr-org-7824 256 28 of of IN blog-dshr-org-7824 256 29 its -PRON- PRP$ blog-dshr-org-7824 256 30 content content NN blog-dshr-org-7824 256 31 , , , blog-dshr-org-7824 256 32 leading lead VBG blog-dshr-org-7824 256 33 to to IN blog-dshr-org-7824 256 34 the the DT blog-dshr-org-7824 256 35 fact fact NN blog-dshr-org-7824 256 36 that that IN blog-dshr-org-7824 256 37 this this DT blog-dshr-org-7824 256 38 campaign campaign NN blog-dshr-org-7824 256 39 was be VBD blog-dshr-org-7824 256 40 not not RB blog-dshr-org-7824 256 41 targeting target VBG blog-dshr-org-7824 256 42 a a DT blog-dshr-org-7824 256 43 specific specific JJ blog-dshr-org-7824 256 44 country country NN blog-dshr-org-7824 256 45 or or CC blog-dshr-org-7824 256 46 developed develop VBN blog-dshr-org-7824 256 47 by by IN blog-dshr-org-7824 256 48 the the DT blog-dshr-org-7824 256 49 same same JJ blog-dshr-org-7824 256 50 developer developer NN blog-dshr-org-7824 256 51 . . . blog-dshr-org-7824 256 52 ” " '' blog-dshr-org-7824 256 53 March March NNP blog-dshr-org-7824 256 54 15 15 CD blog-dshr-org-7824 256 55 , , , blog-dshr-org-7824 256 56 2019 2019 CD blog-dshr-org-7824 256 57 at at IN blog-dshr-org-7824 256 58 8:24 8:24 CD blog-dshr-org-7824 256 59 AM am NN blog-dshr-org-7824 256 60 David David NNP blog-dshr-org-7824 256 61 . . . blog-dshr-org-7824 257 1 said say VBD blog-dshr-org-7824 257 2 ... ... : blog-dshr-org-7824 257 3 Kim Kim NNP blog-dshr-org-7824 257 4 Zetter Zetter NNP blog-dshr-org-7824 257 5 's 's POS blog-dshr-org-7824 257 6 Hackers Hackers NNP blog-dshr-org-7824 257 7 Hijacked Hijacked NNP blog-dshr-org-7824 257 8 ASUS ASUS NNP blog-dshr-org-7824 257 9 Software software NN blog-dshr-org-7824 257 10 Updates Updates NNPS blog-dshr-org-7824 257 11 to to TO blog-dshr-org-7824 257 12 Install Install NNP blog-dshr-org-7824 257 13 Backdoors Backdoors NNP blog-dshr-org-7824 257 14 on on IN blog-dshr-org-7824 257 15 Thousands thousand NNS blog-dshr-org-7824 257 16 of of IN blog-dshr-org-7824 257 17 Computers Computers NNPS blog-dshr-org-7824 257 18 is be VBZ blog-dshr-org-7824 257 19 an an DT blog-dshr-org-7824 257 20 excellent excellent JJ blog-dshr-org-7824 257 21 example example NN blog-dshr-org-7824 257 22 of of IN blog-dshr-org-7824 257 23 a a DT blog-dshr-org-7824 257 24 software software NN blog-dshr-org-7824 257 25 supply supply NN blog-dshr-org-7824 257 26 chain chain NN blog-dshr-org-7824 257 27 attack attack NN blog-dshr-org-7824 257 28 : : : blog-dshr-org-7824 257 29 " " `` blog-dshr-org-7824 257 30 Researchers researcher NNS blog-dshr-org-7824 257 31 at at IN blog-dshr-org-7824 257 32 cybersecurity cybersecurity NN blog-dshr-org-7824 257 33 firm firm NN blog-dshr-org-7824 257 34 Kaspersky Kaspersky NNP blog-dshr-org-7824 257 35 Lab Lab NNP blog-dshr-org-7824 257 36 say say VBP blog-dshr-org-7824 257 37 that that IN blog-dshr-org-7824 257 38 ASUS ASUS NNP blog-dshr-org-7824 257 39 , , , blog-dshr-org-7824 257 40 one one CD blog-dshr-org-7824 257 41 of of IN blog-dshr-org-7824 257 42 the the DT blog-dshr-org-7824 257 43 world world NN blog-dshr-org-7824 257 44 ’s ’s POS blog-dshr-org-7824 257 45 largest large JJS blog-dshr-org-7824 257 46 computer computer NN blog-dshr-org-7824 257 47 makers maker NNS blog-dshr-org-7824 257 48 , , , blog-dshr-org-7824 257 49 was be VBD blog-dshr-org-7824 257 50 used use VBN blog-dshr-org-7824 257 51 to to TO blog-dshr-org-7824 257 52 unwittingly unwittingly RB blog-dshr-org-7824 257 53 install install VB blog-dshr-org-7824 257 54 a a DT blog-dshr-org-7824 257 55 malicious malicious JJ blog-dshr-org-7824 257 56 backdoor backdoor NN blog-dshr-org-7824 257 57 on on IN blog-dshr-org-7824 257 58 thousands thousand NNS blog-dshr-org-7824 257 59 of of IN blog-dshr-org-7824 257 60 its -PRON- PRP$ blog-dshr-org-7824 257 61 customers customer NNS blog-dshr-org-7824 257 62 ’ ’ POS blog-dshr-org-7824 257 63 computers computer NNS blog-dshr-org-7824 257 64 last last JJ blog-dshr-org-7824 257 65 year year NN blog-dshr-org-7824 257 66 after after IN blog-dshr-org-7824 257 67 attackers attacker NNS blog-dshr-org-7824 257 68 compromised compromise VBD blog-dshr-org-7824 257 69 a a DT blog-dshr-org-7824 257 70 server server NN blog-dshr-org-7824 257 71 for for IN blog-dshr-org-7824 257 72 the the DT blog-dshr-org-7824 257 73 company company NN blog-dshr-org-7824 257 74 ’s ’s POS blog-dshr-org-7824 257 75 live live JJ blog-dshr-org-7824 257 76 software software NN blog-dshr-org-7824 257 77 update update NN blog-dshr-org-7824 257 78 tool tool NN blog-dshr-org-7824 257 79 . . . blog-dshr-org-7824 258 1 The the DT blog-dshr-org-7824 258 2 malicious malicious JJ blog-dshr-org-7824 258 3 file file NN blog-dshr-org-7824 258 4 was be VBD blog-dshr-org-7824 258 5 signed sign VBN blog-dshr-org-7824 258 6 with with IN blog-dshr-org-7824 258 7 legitimate legitimate JJ blog-dshr-org-7824 258 8 ASUS ASUS NNP blog-dshr-org-7824 258 9 digital digital JJ blog-dshr-org-7824 258 10 certificates certificate NNS blog-dshr-org-7824 258 11 to to TO blog-dshr-org-7824 258 12 make make VB blog-dshr-org-7824 258 13 it -PRON- PRP blog-dshr-org-7824 258 14 appear appear VB blog-dshr-org-7824 258 15 to to TO blog-dshr-org-7824 258 16 be be VB blog-dshr-org-7824 258 17 an an DT blog-dshr-org-7824 258 18 authentic authentic JJ blog-dshr-org-7824 258 19 software software NN blog-dshr-org-7824 258 20 update update NN blog-dshr-org-7824 258 21 from from IN blog-dshr-org-7824 258 22 the the DT blog-dshr-org-7824 258 23 company company NN blog-dshr-org-7824 258 24 , , , blog-dshr-org-7824 258 25 Kaspersky Kaspersky NNP blog-dshr-org-7824 258 26 Lab Lab NNP blog-dshr-org-7824 258 27 says say VBZ blog-dshr-org-7824 258 28 . . . blog-dshr-org-7824 258 29 " " '' blog-dshr-org-7824 259 1 March March NNP blog-dshr-org-7824 259 2 25 25 CD blog-dshr-org-7824 259 3 , , , blog-dshr-org-7824 259 4 2019 2019 CD blog-dshr-org-7824 259 5 at at IN blog-dshr-org-7824 259 6 10:21 10:21 CD blog-dshr-org-7824 259 7 AM am NN blog-dshr-org-7824 259 8 David David NNP blog-dshr-org-7824 259 9 . . . blog-dshr-org-7824 260 1 said say VBD blog-dshr-org-7824 260 2 ... ... : blog-dshr-org-7824 260 3 Sean Sean NNP blog-dshr-org-7824 260 4 Gallagher Gallagher NNP blog-dshr-org-7824 260 5 's 's POS blog-dshr-org-7824 260 6 UK UK NNP blog-dshr-org-7824 260 7 cyber cyber JJ blog-dshr-org-7824 260 8 security security NN blog-dshr-org-7824 260 9 officials official NNS blog-dshr-org-7824 260 10 report report VBP blog-dshr-org-7824 260 11 Huawei Huawei NNP blog-dshr-org-7824 260 12 ’s ’s POS blog-dshr-org-7824 260 13 security security NN blog-dshr-org-7824 260 14 practices practice NNS blog-dshr-org-7824 260 15 are be VBP blog-dshr-org-7824 260 16 a a DT blog-dshr-org-7824 260 17 mess mess NN blog-dshr-org-7824 260 18 reports report NNS blog-dshr-org-7824 260 19 on on IN blog-dshr-org-7824 260 20 the the DT blog-dshr-org-7824 260 21 latest late JJS blog-dshr-org-7824 260 22 report report NN blog-dshr-org-7824 260 23 from from IN blog-dshr-org-7824 260 24 the the DT blog-dshr-org-7824 260 25 HCSEC HCSEC NNP blog-dshr-org-7824 260 26 Oversight Oversight NNP blog-dshr-org-7824 260 27 Board Board NNP blog-dshr-org-7824 260 28 . . . blog-dshr-org-7824 261 1 They -PRON- PRP blog-dshr-org-7824 261 2 still still RB blog-dshr-org-7824 261 3 ca can MD blog-dshr-org-7824 261 4 n't not RB blog-dshr-org-7824 261 5 do do VB blog-dshr-org-7824 261 6 reproducible reproducible VB blog-dshr-org-7824 261 7 builds build VBZ blog-dshr-org-7824 261 8 : : : blog-dshr-org-7824 261 9 " " `` blog-dshr-org-7824 261 10 HCSEC HCSEC NNP blog-dshr-org-7824 261 11 reported report VBD blog-dshr-org-7824 261 12 that that IN blog-dshr-org-7824 261 13 the the DT blog-dshr-org-7824 261 14 software software NN blog-dshr-org-7824 261 15 build build VBP blog-dshr-org-7824 261 16 process process NN blog-dshr-org-7824 261 17 used use VBN blog-dshr-org-7824 261 18 by by IN blog-dshr-org-7824 261 19 Huawei Huawei NNP blog-dshr-org-7824 261 20 results result NNS blog-dshr-org-7824 261 21 in in IN blog-dshr-org-7824 261 22 inconsistencies inconsistency NNS blog-dshr-org-7824 261 23 between between IN blog-dshr-org-7824 261 24 software software NN blog-dshr-org-7824 261 25 images image NNS blog-dshr-org-7824 261 26 . . . blog-dshr-org-7824 262 1 In in IN blog-dshr-org-7824 262 2 other other JJ blog-dshr-org-7824 262 3 words word NNS blog-dshr-org-7824 262 4 , , , blog-dshr-org-7824 262 5 products product NNS blog-dshr-org-7824 262 6 ship ship VBP blog-dshr-org-7824 262 7 with with IN blog-dshr-org-7824 262 8 software software NN blog-dshr-org-7824 262 9 with with IN blog-dshr-org-7824 262 10 widely widely RB blog-dshr-org-7824 262 11 varying vary VBG blog-dshr-org-7824 262 12 fingerprints fingerprint NNS blog-dshr-org-7824 262 13 , , , blog-dshr-org-7824 262 14 so so CC blog-dshr-org-7824 262 15 it -PRON- PRP blog-dshr-org-7824 262 16 ’s ’ VBZ blog-dshr-org-7824 262 17 impossible impossible JJ blog-dshr-org-7824 262 18 to to TO blog-dshr-org-7824 262 19 determine determine VB blog-dshr-org-7824 262 20 whether whether IN blog-dshr-org-7824 262 21 the the DT blog-dshr-org-7824 262 22 code code NN blog-dshr-org-7824 262 23 is be VBZ blog-dshr-org-7824 262 24 the the DT blog-dshr-org-7824 262 25 same same JJ blog-dshr-org-7824 262 26 based base VBN blog-dshr-org-7824 262 27 on on IN blog-dshr-org-7824 262 28 checksums checksum NNS blog-dshr-org-7824 262 29 . . . blog-dshr-org-7824 262 30 " " '' blog-dshr-org-7824 263 1 Which which WDT blog-dshr-org-7824 263 2 is be VBZ blog-dshr-org-7824 263 3 n't not RB blog-dshr-org-7824 263 4 a a DT blog-dshr-org-7824 263 5 surprise surprise NN blog-dshr-org-7824 263 6 , , , blog-dshr-org-7824 263 7 Huawei Huawei NNP blog-dshr-org-7824 263 8 already already RB blog-dshr-org-7824 263 9 said say VBD blog-dshr-org-7824 263 10 it -PRON- PRP blog-dshr-org-7824 263 11 'd 'd MD blog-dshr-org-7824 263 12 take take VB blog-dshr-org-7824 263 13 another another DT blog-dshr-org-7824 263 14 5 5 CD blog-dshr-org-7824 263 15 years year NNS blog-dshr-org-7824 263 16 . . . blog-dshr-org-7824 264 1 But but CC blog-dshr-org-7824 264 2 I -PRON- PRP blog-dshr-org-7824 264 3 'd 'd MD blog-dshr-org-7824 264 4 be be VB blog-dshr-org-7824 264 5 more more RBR blog-dshr-org-7824 264 6 concerned concerned JJ blog-dshr-org-7824 264 7 that that IN blog-dshr-org-7824 264 8 : : : blog-dshr-org-7824 264 9 " " `` blog-dshr-org-7824 264 10 One one CD blog-dshr-org-7824 264 11 major major JJ blog-dshr-org-7824 264 12 problem problem NN blog-dshr-org-7824 264 13 cited cite VBN blog-dshr-org-7824 264 14 by by IN blog-dshr-org-7824 264 15 the the DT blog-dshr-org-7824 264 16 report report NN blog-dshr-org-7824 264 17 is be VBZ blog-dshr-org-7824 264 18 that that IN blog-dshr-org-7824 264 19 a a DT blog-dshr-org-7824 264 20 large large JJ blog-dshr-org-7824 264 21 portion portion NN blog-dshr-org-7824 264 22 of of IN blog-dshr-org-7824 264 23 Huawei Huawei NNP blog-dshr-org-7824 264 24 ’s ’s POS blog-dshr-org-7824 264 25 network network NN blog-dshr-org-7824 264 26 gear gear NN blog-dshr-org-7824 264 27 still still RB blog-dshr-org-7824 264 28 relies rely VBZ blog-dshr-org-7824 264 29 on on IN blog-dshr-org-7824 264 30 version version NN blog-dshr-org-7824 264 31 5.5 5.5 CD blog-dshr-org-7824 264 32 of of IN blog-dshr-org-7824 264 33 Wind Wind NNP blog-dshr-org-7824 264 34 River River NNP blog-dshr-org-7824 264 35 ’s ’s POS blog-dshr-org-7824 264 36 VxWorks VxWorks NNP blog-dshr-org-7824 264 37 real real JJ blog-dshr-org-7824 264 38 - - HYPH blog-dshr-org-7824 264 39 time time NN blog-dshr-org-7824 264 40 operating operating NN blog-dshr-org-7824 264 41 system system NN blog-dshr-org-7824 264 42 ( ( -LRB- blog-dshr-org-7824 264 43 RTOS RTOS NNP blog-dshr-org-7824 264 44 ) ) -RRB- blog-dshr-org-7824 264 45 , , , blog-dshr-org-7824 264 46 which which WDT blog-dshr-org-7824 264 47 has have VBZ blog-dshr-org-7824 264 48 reached reach VBN blog-dshr-org-7824 264 49 its -PRON- PRP$ blog-dshr-org-7824 264 50 “ " `` blog-dshr-org-7824 264 51 end end NN blog-dshr-org-7824 264 52 of of IN blog-dshr-org-7824 264 53 life life NN blog-dshr-org-7824 264 54 ” " '' blog-dshr-org-7824 264 55 and and CC blog-dshr-org-7824 264 56 will will MD blog-dshr-org-7824 264 57 soon soon RB blog-dshr-org-7824 264 58 no no RB blog-dshr-org-7824 264 59 longer longer RB blog-dshr-org-7824 264 60 be be VB blog-dshr-org-7824 264 61 supported support VBN blog-dshr-org-7824 264 62 . . . blog-dshr-org-7824 265 1 Huawei Huawei NNP blog-dshr-org-7824 265 2 has have VBZ blog-dshr-org-7824 265 3 bought buy VBN blog-dshr-org-7824 265 4 a a DT blog-dshr-org-7824 265 5 premium premium JJ blog-dshr-org-7824 265 6 long long JJ blog-dshr-org-7824 265 7 - - HYPH blog-dshr-org-7824 265 8 term term NN blog-dshr-org-7824 265 9 support support NN blog-dshr-org-7824 265 10 license license NN blog-dshr-org-7824 265 11 from from IN blog-dshr-org-7824 265 12 VxWorks VxWorks NNP blog-dshr-org-7824 265 13 , , , blog-dshr-org-7824 265 14 but but CC blog-dshr-org-7824 265 15 that that DT blog-dshr-org-7824 265 16 support support NN blog-dshr-org-7824 265 17 runs run VBZ blog-dshr-org-7824 265 18 out out RP blog-dshr-org-7824 265 19 in in IN blog-dshr-org-7824 265 20 2020 2020 CD blog-dshr-org-7824 265 21 . . . blog-dshr-org-7824 265 22 " " '' blog-dshr-org-7824 266 1 And and CC blog-dshr-org-7824 266 2 Huawei Huawei NNP blog-dshr-org-7824 266 3 is be VBZ blog-dshr-org-7824 266 4 rolling roll VBG blog-dshr-org-7824 266 5 its -PRON- PRP$ blog-dshr-org-7824 266 6 own own JJ blog-dshr-org-7824 266 7 RTOS rtos NN blog-dshr-org-7824 266 8 based base VBN blog-dshr-org-7824 266 9 on on IN blog-dshr-org-7824 266 10 Linux Linux NNP blog-dshr-org-7824 266 11 . . . blog-dshr-org-7824 267 1 What what WP blog-dshr-org-7824 267 2 could could MD blog-dshr-org-7824 267 3 possibly possibly RB blog-dshr-org-7824 267 4 go go VB blog-dshr-org-7824 267 5 wrong wrong JJ blog-dshr-org-7824 267 6 ? ? . blog-dshr-org-7824 268 1 March March NNP blog-dshr-org-7824 268 2 28 28 CD blog-dshr-org-7824 268 3 , , , blog-dshr-org-7824 268 4 2019 2019 CD blog-dshr-org-7824 268 5 at at IN blog-dshr-org-7824 268 6 1:29 1:29 CD blog-dshr-org-7824 268 7 PM PM NNP blog-dshr-org-7824 268 8 David David NNP blog-dshr-org-7824 268 9 . . . blog-dshr-org-7824 269 1 said say VBD blog-dshr-org-7824 269 2 ... ... : blog-dshr-org-7824 270 1 The the DT blog-dshr-org-7824 270 2 latest late JJS blog-dshr-org-7824 270 3 software software NN blog-dshr-org-7824 270 4 supply supply NN blog-dshr-org-7824 270 5 chain chain NN blog-dshr-org-7824 270 6 attack attack NN blog-dshr-org-7824 270 7 victim victim NN blog-dshr-org-7824 270 8 is be VBZ blog-dshr-org-7824 270 9 bootstrap bootstrap NN blog-dshr-org-7824 270 10 - - HYPH blog-dshr-org-7824 270 11 sass sass NN blog-dshr-org-7824 270 12 via via IN blog-dshr-org-7824 270 13 RubyGems RubyGems NNP blog-dshr-org-7824 270 14 , , , blog-dshr-org-7824 270 15 with with IN blog-dshr-org-7824 270 16 about about RB blog-dshr-org-7824 270 17 28 28 CD blog-dshr-org-7824 270 18 M m CD blog-dshr-org-7824 270 19 downloads download NNS blog-dshr-org-7824 270 20 . . . blog-dshr-org-7824 271 1 April April NNP blog-dshr-org-7824 271 2 6 6 CD blog-dshr-org-7824 271 3 , , , blog-dshr-org-7824 271 4 2019 2019 CD blog-dshr-org-7824 271 5 at at IN blog-dshr-org-7824 271 6 7:20 7:20 CD blog-dshr-org-7824 271 7 AM am NN blog-dshr-org-7824 271 8 David David NNP blog-dshr-org-7824 271 9 . . . blog-dshr-org-7824 272 1 said say VBD blog-dshr-org-7824 272 2 ... ... : blog-dshr-org-7824 273 1 It -PRON- PRP blog-dshr-org-7824 273 2 turns turn VBZ blog-dshr-org-7824 273 3 out out RP blog-dshr-org-7824 273 4 that that IN blog-dshr-org-7824 273 5 ShadowHammer ShadowHammer NNP blog-dshr-org-7824 273 6 Targets Targets NNP blog-dshr-org-7824 273 7 Multiple Multiple NNP blog-dshr-org-7824 273 8 Companies Companies NNPS blog-dshr-org-7824 273 9 , , , blog-dshr-org-7824 273 10 ASUS ASUS NNP blog-dshr-org-7824 273 11 Just just RB blog-dshr-org-7824 273 12 One one CD blog-dshr-org-7824 273 13 of of IN blog-dshr-org-7824 273 14 Them -PRON- PRP blog-dshr-org-7824 273 15 : : : blog-dshr-org-7824 273 16 " " `` blog-dshr-org-7824 273 17 ASUS ASUS NNP blog-dshr-org-7824 273 18 was be VBD blog-dshr-org-7824 273 19 not not RB blog-dshr-org-7824 273 20 the the DT blog-dshr-org-7824 273 21 only only JJ blog-dshr-org-7824 273 22 company company NN blog-dshr-org-7824 273 23 targeted target VBN blog-dshr-org-7824 273 24 by by IN blog-dshr-org-7824 273 25 supply supply NN blog-dshr-org-7824 273 26 - - HYPH blog-dshr-org-7824 273 27 chain chain NN blog-dshr-org-7824 273 28 attacks attack NNS blog-dshr-org-7824 273 29 during during IN blog-dshr-org-7824 273 30 the the DT blog-dshr-org-7824 273 31 ShadowHammer ShadowHammer NNP blog-dshr-org-7824 273 32 hacking hack VBG blog-dshr-org-7824 273 33 operation operation NN blog-dshr-org-7824 273 34 as as IN blog-dshr-org-7824 273 35 discovered discover VBN blog-dshr-org-7824 273 36 by by IN blog-dshr-org-7824 273 37 Kaspersky Kaspersky NNP blog-dshr-org-7824 273 38 , , , blog-dshr-org-7824 273 39 with with IN blog-dshr-org-7824 273 40 at at RB blog-dshr-org-7824 273 41 least least JJS blog-dshr-org-7824 273 42 six six CD blog-dshr-org-7824 273 43 other other JJ blog-dshr-org-7824 273 44 organizations organization NNS blog-dshr-org-7824 273 45 having have VBG blog-dshr-org-7824 273 46 been be VBN blog-dshr-org-7824 273 47 infiltrated infiltrate VBN blog-dshr-org-7824 273 48 by by IN blog-dshr-org-7824 273 49 the the DT blog-dshr-org-7824 273 50 attackers attacker NNS blog-dshr-org-7824 273 51 . . . blog-dshr-org-7824 274 1 As as IN blog-dshr-org-7824 274 2 further further RB blog-dshr-org-7824 274 3 found find VBN blog-dshr-org-7824 274 4 out out RP blog-dshr-org-7824 274 5 by by IN blog-dshr-org-7824 274 6 Kaspersky Kaspersky NNP blog-dshr-org-7824 274 7 's 's POS blog-dshr-org-7824 274 8 security security NN blog-dshr-org-7824 274 9 researchers researcher NNS blog-dshr-org-7824 274 10 , , , blog-dshr-org-7824 274 11 ASUS ASUS NNP blog-dshr-org-7824 274 12 ' ' POS blog-dshr-org-7824 274 13 supply supply NN blog-dshr-org-7824 274 14 chain chain NN blog-dshr-org-7824 274 15 was be VBD blog-dshr-org-7824 274 16 successfully successfully RB blog-dshr-org-7824 274 17 compromised compromise VBN blog-dshr-org-7824 274 18 by by IN blog-dshr-org-7824 274 19 trojanizing trojanize VBG blog-dshr-org-7824 274 20 one one CD blog-dshr-org-7824 274 21 of of IN blog-dshr-org-7824 274 22 the the DT blog-dshr-org-7824 274 23 company company NN blog-dshr-org-7824 274 24 's 's POS blog-dshr-org-7824 274 25 notebook notebook NN blog-dshr-org-7824 274 26 software software NN blog-dshr-org-7824 274 27 updaters updater NNS blog-dshr-org-7824 274 28 named name VBN blog-dshr-org-7824 274 29 ASUS ASUS NNP blog-dshr-org-7824 274 30 Live Live NNP blog-dshr-org-7824 274 31 Updater Updater NNP blog-dshr-org-7824 274 32 which which WDT blog-dshr-org-7824 274 33 eventually eventually RB blog-dshr-org-7824 274 34 was be VBD blog-dshr-org-7824 274 35 downloaded download VBN blog-dshr-org-7824 274 36 and and CC blog-dshr-org-7824 274 37 installed instal VBN blog-dshr-org-7824 274 38 on on IN blog-dshr-org-7824 274 39 the the DT blog-dshr-org-7824 274 40 computers computer NNS blog-dshr-org-7824 274 41 of of IN blog-dshr-org-7824 274 42 tens ten NNS blog-dshr-org-7824 274 43 of of IN blog-dshr-org-7824 274 44 thousands thousand NNS blog-dshr-org-7824 274 45 of of IN blog-dshr-org-7824 274 46 customers customer NNS blog-dshr-org-7824 274 47 according accord VBG blog-dshr-org-7824 274 48 to to IN blog-dshr-org-7824 274 49 experts expert NNS blog-dshr-org-7824 274 50 ' ' POS blog-dshr-org-7824 274 51 estimations estimation NNS blog-dshr-org-7824 274 52 . . . blog-dshr-org-7824 274 53 " " '' blog-dshr-org-7824 275 1 April April NNP blog-dshr-org-7824 275 2 23 23 CD blog-dshr-org-7824 275 3 , , , blog-dshr-org-7824 275 4 2019 2019 CD blog-dshr-org-7824 275 5 at at IN blog-dshr-org-7824 275 6 5:45 5:45 CD blog-dshr-org-7824 275 7 PM pm NN blog-dshr-org-7824 275 8 David David NNP blog-dshr-org-7824 275 9 . . . blog-dshr-org-7824 276 1 said say VBD blog-dshr-org-7824 276 2 ... ... . blog-dshr-org-7824 276 3 Who who WP blog-dshr-org-7824 276 4 Owns own VBZ blog-dshr-org-7824 276 5 Huawei Huawei NNP blog-dshr-org-7824 276 6 ? ? . blog-dshr-org-7824 277 1 by by IN blog-dshr-org-7824 277 2 Christopher Christopher NNP blog-dshr-org-7824 277 3 Balding Balding NNP blog-dshr-org-7824 277 4 and and CC blog-dshr-org-7824 277 5 Donald Donald NNP blog-dshr-org-7824 277 6 C. C. NNP blog-dshr-org-7824 277 7 Clarke Clarke NNP blog-dshr-org-7824 277 8 concludes conclude VBZ blog-dshr-org-7824 277 9 that that DT blog-dshr-org-7824 277 10 : : : blog-dshr-org-7824 277 11 " " `` blog-dshr-org-7824 277 12 Huawei Huawei NNP blog-dshr-org-7824 277 13 calls call VBZ blog-dshr-org-7824 277 14 itself -PRON- PRP blog-dshr-org-7824 277 15 “ " `` blog-dshr-org-7824 277 16 employee employee NN blog-dshr-org-7824 277 17 - - HYPH blog-dshr-org-7824 277 18 owned own VBN blog-dshr-org-7824 277 19 , , , blog-dshr-org-7824 277 20 ” " '' blog-dshr-org-7824 277 21 but but CC blog-dshr-org-7824 277 22 this this DT blog-dshr-org-7824 277 23 claim claim NN blog-dshr-org-7824 277 24 is be VBZ blog-dshr-org-7824 277 25 questionable questionable JJ blog-dshr-org-7824 277 26 , , , blog-dshr-org-7824 277 27 and and CC blog-dshr-org-7824 277 28 the the DT blog-dshr-org-7824 277 29 corporate corporate JJ blog-dshr-org-7824 277 30 structure structure NN blog-dshr-org-7824 277 31 described describe VBN blog-dshr-org-7824 277 32 on on IN blog-dshr-org-7824 277 33 its -PRON- PRP$ blog-dshr-org-7824 277 34 website website NN blog-dshr-org-7824 277 35 is be VBZ blog-dshr-org-7824 277 36 misleading misleading JJ blog-dshr-org-7824 277 37 . . . blog-dshr-org-7824 277 38 " " '' blog-dshr-org-7824 278 1 April April NNP blog-dshr-org-7824 278 2 27 27 CD blog-dshr-org-7824 278 3 , , , blog-dshr-org-7824 278 4 2019 2019 CD blog-dshr-org-7824 278 5 at at IN blog-dshr-org-7824 278 6 1:56 1:56 CD blog-dshr-org-7824 278 7 PM pm NN blog-dshr-org-7824 278 8 David David NNP blog-dshr-org-7824 278 9 . . . blog-dshr-org-7824 279 1 said say VBD blog-dshr-org-7824 279 2 ... ... : blog-dshr-org-7824 279 3 David David NNP blog-dshr-org-7824 279 4 A. A. NNP blog-dshr-org-7824 279 5 Wheeler Wheeler NNP blog-dshr-org-7824 279 6 reports report VBZ blog-dshr-org-7824 279 7 on on IN blog-dshr-org-7824 279 8 another another DT blog-dshr-org-7824 279 9 not not RB blog-dshr-org-7824 279 10 - - HYPH blog-dshr-org-7824 279 11 very very RB blog-dshr-org-7824 279 12 - - HYPH blog-dshr-org-7824 279 13 successful successful JJ blog-dshr-org-7824 279 14 software software NN blog-dshr-org-7824 279 15 supply supply NN blog-dshr-org-7824 279 16 chain chain NN blog-dshr-org-7824 279 17 attack attack NN blog-dshr-org-7824 279 18 : : : blog-dshr-org-7824 279 19 " " `` blog-dshr-org-7824 279 20 A a DT blog-dshr-org-7824 279 21 malicious malicious JJ blog-dshr-org-7824 279 22 backdoor backdoor NN blog-dshr-org-7824 279 23 has have VBZ blog-dshr-org-7824 279 24 been be VBN blog-dshr-org-7824 279 25 found find VBN blog-dshr-org-7824 279 26 in in IN blog-dshr-org-7824 279 27 the the DT blog-dshr-org-7824 279 28 popular popular JJ blog-dshr-org-7824 279 29 open open JJ blog-dshr-org-7824 279 30 source source NN blog-dshr-org-7824 279 31 software software NN blog-dshr-org-7824 279 32 library library NN blog-dshr-org-7824 279 33 bootstrap bootstrap NN blog-dshr-org-7824 279 34 - - HYPH blog-dshr-org-7824 279 35 sass sass NN blog-dshr-org-7824 279 36 . . . blog-dshr-org-7824 280 1 This this DT blog-dshr-org-7824 280 2 was be VBD blog-dshr-org-7824 280 3 done do VBN blog-dshr-org-7824 280 4 by by IN blog-dshr-org-7824 280 5 someone someone NN blog-dshr-org-7824 280 6 who who WP blog-dshr-org-7824 280 7 created create VBD blog-dshr-org-7824 280 8 an an DT blog-dshr-org-7824 280 9 unauthorized unauthorized JJ blog-dshr-org-7824 280 10 updated update VBN blog-dshr-org-7824 280 11 version version NN blog-dshr-org-7824 280 12 of of IN blog-dshr-org-7824 280 13 the the DT blog-dshr-org-7824 280 14 software software NN blog-dshr-org-7824 280 15 on on IN blog-dshr-org-7824 280 16 the the DT blog-dshr-org-7824 280 17 RubyGems RubyGems NNP blog-dshr-org-7824 280 18 software software NN blog-dshr-org-7824 280 19 hosting host VBG blog-dshr-org-7824 280 20 site site NN blog-dshr-org-7824 280 21 . . . blog-dshr-org-7824 281 1 The the DT blog-dshr-org-7824 281 2 good good JJ blog-dshr-org-7824 281 3 news news NN blog-dshr-org-7824 281 4 is be VBZ blog-dshr-org-7824 281 5 that that IN blog-dshr-org-7824 281 6 it -PRON- PRP blog-dshr-org-7824 281 7 was be VBD blog-dshr-org-7824 281 8 quickly quickly RB blog-dshr-org-7824 281 9 detected detect VBN blog-dshr-org-7824 281 10 ( ( -LRB- blog-dshr-org-7824 281 11 within within IN blog-dshr-org-7824 281 12 the the DT blog-dshr-org-7824 281 13 day day NN blog-dshr-org-7824 281 14 ) ) -RRB- blog-dshr-org-7824 281 15 and and CC blog-dshr-org-7824 281 16 updated update VBN blog-dshr-org-7824 281 17 , , , blog-dshr-org-7824 281 18 and and CC blog-dshr-org-7824 281 19 that that DT blog-dshr-org-7824 281 20 limited limit VBD blog-dshr-org-7824 281 21 the the DT blog-dshr-org-7824 281 22 impact impact NN blog-dshr-org-7824 281 23 of of IN blog-dshr-org-7824 281 24 this this DT blog-dshr-org-7824 281 25 subversion subversion NN blog-dshr-org-7824 281 26 . . . blog-dshr-org-7824 282 1 The the DT blog-dshr-org-7824 282 2 backdoored backdoore VBN blog-dshr-org-7824 282 3 version version NN blog-dshr-org-7824 282 4 ( ( -LRB- blog-dshr-org-7824 282 5 3.2.0.3 3.2.0.3 CD blog-dshr-org-7824 282 6 ) ) -RRB- blog-dshr-org-7824 282 7 was be VBD blog-dshr-org-7824 282 8 only only RB blog-dshr-org-7824 282 9 downloaded download VBN blog-dshr-org-7824 282 10 1,477 1,477 CD blog-dshr-org-7824 282 11 times time NNS blog-dshr-org-7824 282 12 . . . blog-dshr-org-7824 283 1 For for IN blog-dshr-org-7824 283 2 comparison comparison NN blog-dshr-org-7824 283 3 , , , blog-dshr-org-7824 283 4 as as IN blog-dshr-org-7824 283 5 of of IN blog-dshr-org-7824 283 6 April April NNP blog-dshr-org-7824 283 7 2019 2019 CD blog-dshr-org-7824 283 8 the the DT blog-dshr-org-7824 283 9 previous previous JJ blog-dshr-org-7824 283 10 version version NN blog-dshr-org-7824 283 11 in in IN blog-dshr-org-7824 283 12 that that DT blog-dshr-org-7824 283 13 branch branch NN blog-dshr-org-7824 283 14 ( ( -LRB- blog-dshr-org-7824 283 15 3.2.0.2 3.2.0.2 CD blog-dshr-org-7824 283 16 ) ) -RRB- blog-dshr-org-7824 283 17 was be VBD blog-dshr-org-7824 283 18 downloaded download VBN blog-dshr-org-7824 283 19 1.2 1.2 CD blog-dshr-org-7824 283 20 million million CD blog-dshr-org-7824 283 21 times time NNS blog-dshr-org-7824 283 22 , , , blog-dshr-org-7824 283 23 and and CC blog-dshr-org-7824 283 24 the the DT blog-dshr-org-7824 283 25 following follow VBG blog-dshr-org-7824 283 26 version version NN blog-dshr-org-7824 283 27 3.2.0.4 3.2.0.4 CD blog-dshr-org-7824 283 28 ( ( -LRB- blog-dshr-org-7824 283 29 which which WDT blog-dshr-org-7824 283 30 duplicated duplicate VBD blog-dshr-org-7824 283 31 3.2.0.2 3.2.0.2 CD blog-dshr-org-7824 283 32 ) ) -RRB- blog-dshr-org-7824 283 33 was be VBD blog-dshr-org-7824 283 34 downloaded download VBN blog-dshr-org-7824 283 35 1,700 1,700 CD blog-dshr-org-7824 283 36 times time NNS blog-dshr-org-7824 283 37 ( ( -LRB- blog-dshr-org-7824 283 38 that that DT blog-dshr-org-7824 283 39 ’s ’ VBZ blog-dshr-org-7824 283 40 more more JJR blog-dshr-org-7824 283 41 than than IN blog-dshr-org-7824 283 42 the the DT blog-dshr-org-7824 283 43 subverted subvert VBN blog-dshr-org-7824 283 44 version version NN blog-dshr-org-7824 283 45 ! ! . blog-dshr-org-7824 283 46 ) ) -RRB- blog-dshr-org-7824 283 47 . . . blog-dshr-org-7824 284 1 So so CC blog-dshr-org-7824 284 2 it -PRON- PRP blog-dshr-org-7824 284 3 is be VBZ blog-dshr-org-7824 284 4 likely likely JJ blog-dshr-org-7824 284 5 that that IN blog-dshr-org-7824 284 6 almost almost RB blog-dshr-org-7824 284 7 all all DT blog-dshr-org-7824 284 8 subverted subvert VBN blog-dshr-org-7824 284 9 systems system NNS blog-dshr-org-7824 284 10 have have VBP blog-dshr-org-7824 284 11 already already RB blog-dshr-org-7824 284 12 been be VBN blog-dshr-org-7824 284 13 fixed fix VBN blog-dshr-org-7824 284 14 . . . blog-dshr-org-7824 284 15 " " '' blog-dshr-org-7824 285 1 Wheeler Wheeler NNP blog-dshr-org-7824 285 2 has have VBZ blog-dshr-org-7824 285 3 three three CD blog-dshr-org-7824 285 4 lessons lesson NNS blog-dshr-org-7824 285 5 from from IN blog-dshr-org-7824 285 6 this this DT blog-dshr-org-7824 285 7 : : : blog-dshr-org-7824 285 8 1 1 LS blog-dshr-org-7824 285 9 . . . blog-dshr-org-7824 286 1 Maintainers maintainer NNS blog-dshr-org-7824 286 2 need need VBP blog-dshr-org-7824 286 3 2FA 2fa CD blog-dshr-org-7824 286 4 . . . blog-dshr-org-7824 287 1 2 2 LS blog-dshr-org-7824 287 2 . . . blog-dshr-org-7824 288 1 Do do VB blog-dshr-org-7824 288 2 n't not RB blog-dshr-org-7824 288 3 update update VB blog-dshr-org-7824 288 4 your -PRON- PRP$ blog-dshr-org-7824 288 5 dependencies dependency NNS blog-dshr-org-7824 288 6 in in IN blog-dshr-org-7824 288 7 the the DT blog-dshr-org-7824 288 8 same same JJ blog-dshr-org-7824 288 9 day day NN blog-dshr-org-7824 288 10 they -PRON- PRP blog-dshr-org-7824 288 11 're be VBP blog-dshr-org-7824 288 12 released release VBN blog-dshr-org-7824 288 13 . . . blog-dshr-org-7824 289 1 3 3 LS blog-dshr-org-7824 289 2 . . . blog-dshr-org-7824 290 1 Reproducible Reproducible NNP blog-dshr-org-7824 290 2 builds build VBZ blog-dshr-org-7824 290 3 ! ! . blog-dshr-org-7824 291 1 May May NNP blog-dshr-org-7824 291 2 2 2 CD blog-dshr-org-7824 291 3 , , , blog-dshr-org-7824 291 4 2019 2019 CD blog-dshr-org-7824 291 5 at at IN blog-dshr-org-7824 291 6 9:43 9:43 CD blog-dshr-org-7824 291 7 AM am NN blog-dshr-org-7824 291 8 David David NNP blog-dshr-org-7824 291 9 . . . blog-dshr-org-7824 292 1 said say VBD blog-dshr-org-7824 292 2 ... ... : blog-dshr-org-7824 292 3 Andy Andy NNP blog-dshr-org-7824 292 4 Greenberg Greenberg NNP blog-dshr-org-7824 292 5 's 's POS blog-dshr-org-7824 292 6 A a DT blog-dshr-org-7824 292 7 mysterious mysterious JJ blog-dshr-org-7824 292 8 hacker hacker NN blog-dshr-org-7824 292 9 gang gang NN blog-dshr-org-7824 292 10 is be VBZ blog-dshr-org-7824 292 11 on on IN blog-dshr-org-7824 292 12 a a DT blog-dshr-org-7824 292 13 supply supply NN blog-dshr-org-7824 292 14 - - HYPH blog-dshr-org-7824 292 15 chain chain NN blog-dshr-org-7824 292 16 hacking hack VBG blog-dshr-org-7824 292 17 spree spree NN blog-dshr-org-7824 292 18 ties tie NNS blog-dshr-org-7824 292 19 various various JJ blog-dshr-org-7824 292 20 software software NN blog-dshr-org-7824 292 21 supply supply NN blog-dshr-org-7824 292 22 chain chain NN blog-dshr-org-7824 292 23 attacks attack NNS blog-dshr-org-7824 292 24 together together RB blog-dshr-org-7824 292 25 and and CC blog-dshr-org-7824 292 26 attributes attribute VBZ blog-dshr-org-7824 292 27 them -PRON- PRP blog-dshr-org-7824 292 28 : : : blog-dshr-org-7824 292 29 " " `` blog-dshr-org-7824 292 30 Over over IN blog-dshr-org-7824 292 31 the the DT blog-dshr-org-7824 292 32 past past JJ blog-dshr-org-7824 292 33 three three CD blog-dshr-org-7824 292 34 years year NNS blog-dshr-org-7824 292 35 , , , blog-dshr-org-7824 292 36 supply supply NN blog-dshr-org-7824 292 37 - - HYPH blog-dshr-org-7824 292 38 chain chain NN blog-dshr-org-7824 292 39 attacks attack NNS blog-dshr-org-7824 292 40 that that WDT blog-dshr-org-7824 292 41 exploited exploit VBD blog-dshr-org-7824 292 42 the the DT blog-dshr-org-7824 292 43 software software NN blog-dshr-org-7824 292 44 distribution distribution NN blog-dshr-org-7824 292 45 channels channel NNS blog-dshr-org-7824 292 46 of of IN blog-dshr-org-7824 292 47 at at IN blog-dshr-org-7824 292 48 least least JJS blog-dshr-org-7824 292 49 six six CD blog-dshr-org-7824 292 50 different different JJ blog-dshr-org-7824 292 51 companies company NNS blog-dshr-org-7824 292 52 have have VBP blog-dshr-org-7824 292 53 now now RB blog-dshr-org-7824 292 54 all all DT blog-dshr-org-7824 292 55 been be VBN blog-dshr-org-7824 292 56 tied tie VBN blog-dshr-org-7824 292 57 to to IN blog-dshr-org-7824 292 58 a a DT blog-dshr-org-7824 292 59 single single JJ blog-dshr-org-7824 292 60 group group NN blog-dshr-org-7824 292 61 of of IN blog-dshr-org-7824 292 62 likely likely JJ blog-dshr-org-7824 292 63 Chinese Chinese NNP blog-dshr-org-7824 292 64 - - HYPH blog-dshr-org-7824 292 65 speaking speak VBG blog-dshr-org-7824 292 66 hackers hacker NNS blog-dshr-org-7824 292 67 . . . blog-dshr-org-7824 293 1 The the DT blog-dshr-org-7824 293 2 group group NN blog-dshr-org-7824 293 3 is be VBZ blog-dshr-org-7824 293 4 known know VBN blog-dshr-org-7824 293 5 as as IN blog-dshr-org-7824 293 6 Barium Barium NNP blog-dshr-org-7824 293 7 , , , blog-dshr-org-7824 293 8 or or CC blog-dshr-org-7824 293 9 sometimes sometimes RB blog-dshr-org-7824 293 10 ShadowHammer ShadowHammer NNP blog-dshr-org-7824 293 11 , , , blog-dshr-org-7824 293 12 ShadowPad ShadowPad NNP blog-dshr-org-7824 293 13 , , , blog-dshr-org-7824 293 14 or or CC blog-dshr-org-7824 293 15 Wicked Wicked NNP blog-dshr-org-7824 293 16 Panda Panda NNP blog-dshr-org-7824 293 17 , , , blog-dshr-org-7824 293 18 depending depend VBG blog-dshr-org-7824 293 19 on on IN blog-dshr-org-7824 293 20 which which WDT blog-dshr-org-7824 293 21 security security NN blog-dshr-org-7824 293 22 firm firm NN blog-dshr-org-7824 293 23 you -PRON- PRP blog-dshr-org-7824 293 24 ask ask VBP blog-dshr-org-7824 293 25 . . . blog-dshr-org-7824 294 1 More More JJR blog-dshr-org-7824 294 2 than than IN blog-dshr-org-7824 294 3 perhaps perhaps RB blog-dshr-org-7824 294 4 any any DT blog-dshr-org-7824 294 5 other other JJ blog-dshr-org-7824 294 6 known know VBN blog-dshr-org-7824 294 7 hacker hacker NN blog-dshr-org-7824 294 8 team team NN blog-dshr-org-7824 294 9 , , , blog-dshr-org-7824 294 10 Barium Barium NNP blog-dshr-org-7824 294 11 appears appear VBZ blog-dshr-org-7824 294 12 to to TO blog-dshr-org-7824 294 13 use use VB blog-dshr-org-7824 294 14 supply supply NN blog-dshr-org-7824 294 15 - - HYPH blog-dshr-org-7824 294 16 chain chain NN blog-dshr-org-7824 294 17 attacks attack NNS blog-dshr-org-7824 294 18 as as IN blog-dshr-org-7824 294 19 its -PRON- PRP$ blog-dshr-org-7824 294 20 core core NN blog-dshr-org-7824 294 21 tool tool NN blog-dshr-org-7824 294 22 . . . blog-dshr-org-7824 295 1 Its -PRON- PRP$ blog-dshr-org-7824 295 2 attacks attack NNS blog-dshr-org-7824 295 3 all all DT blog-dshr-org-7824 295 4 follow follow VBP blog-dshr-org-7824 295 5 a a DT blog-dshr-org-7824 295 6 similar similar JJ blog-dshr-org-7824 295 7 pattern pattern NN blog-dshr-org-7824 295 8 : : : blog-dshr-org-7824 295 9 seed seed VB blog-dshr-org-7824 295 10 out out RP blog-dshr-org-7824 295 11 infections infection NNS blog-dshr-org-7824 295 12 to to IN blog-dshr-org-7824 295 13 a a DT blog-dshr-org-7824 295 14 massive massive JJ blog-dshr-org-7824 295 15 collection collection NN blog-dshr-org-7824 295 16 of of IN blog-dshr-org-7824 295 17 victims victim NNS blog-dshr-org-7824 295 18 , , , blog-dshr-org-7824 295 19 then then RB blog-dshr-org-7824 295 20 sort sort VB blog-dshr-org-7824 295 21 through through IN blog-dshr-org-7824 295 22 them -PRON- PRP blog-dshr-org-7824 295 23 to to TO blog-dshr-org-7824 295 24 find find VB blog-dshr-org-7824 295 25 espionage espionage NN blog-dshr-org-7824 295 26 targets target NNS blog-dshr-org-7824 295 27 . . . blog-dshr-org-7824 295 28 " " '' blog-dshr-org-7824 296 1 May May NNP blog-dshr-org-7824 296 2 4 4 CD blog-dshr-org-7824 296 3 , , , blog-dshr-org-7824 296 4 2019 2019 CD blog-dshr-org-7824 296 5 at at IN blog-dshr-org-7824 296 6 9:55 9:55 CD blog-dshr-org-7824 296 7 AM am NN blog-dshr-org-7824 296 8 David David NNP blog-dshr-org-7824 296 9 . . . blog-dshr-org-7824 297 1 said say VBD blog-dshr-org-7824 297 2 ... ... : blog-dshr-org-7824 298 1 Someone someone NN blog-dshr-org-7824 298 2 Is be VBZ blog-dshr-org-7824 298 3 Spamming spamme VBG blog-dshr-org-7824 298 4 and and CC blog-dshr-org-7824 298 5 Breaking break VBG blog-dshr-org-7824 298 6 a a DT blog-dshr-org-7824 298 7 Core Core NNP blog-dshr-org-7824 298 8 Component Component NNP blog-dshr-org-7824 298 9 of of IN blog-dshr-org-7824 298 10 PGP PGP NNP blog-dshr-org-7824 298 11 ’s ’s POS blog-dshr-org-7824 298 12 Ecosystem Ecosystem NNP blog-dshr-org-7824 298 13 by by IN blog-dshr-org-7824 298 14 Lorenzo Lorenzo NNP blog-dshr-org-7824 298 15 Franceschi Franceschi NNP blog-dshr-org-7824 298 16 - - HYPH blog-dshr-org-7824 298 17 Bicchierai Bicchierai NNP blog-dshr-org-7824 298 18 reports report VBZ blog-dshr-org-7824 298 19 on on IN blog-dshr-org-7824 298 20 an an DT blog-dshr-org-7824 298 21 attack attack NN blog-dshr-org-7824 298 22 on on IN blog-dshr-org-7824 298 23 two two CD blog-dshr-org-7824 298 24 of of IN blog-dshr-org-7824 298 25 the the DT blog-dshr-org-7824 298 26 core core NN blog-dshr-org-7824 298 27 PGP PGP NNP blog-dshr-org-7824 298 28 developers developer NNS blog-dshr-org-7824 298 29 , , , blog-dshr-org-7824 298 30 Robert Robert NNP blog-dshr-org-7824 298 31 J. J. NNP blog-dshr-org-7824 298 32 Hansen Hansen NNP blog-dshr-org-7824 298 33 and and CC blog-dshr-org-7824 298 34 Daniel Daniel NNP blog-dshr-org-7824 298 35 Kahn Kahn NNP blog-dshr-org-7824 298 36 Gillmor Gillmor NNP blog-dshr-org-7824 298 37 : : : blog-dshr-org-7824 298 38 " " `` blog-dshr-org-7824 298 39 Last last JJ blog-dshr-org-7824 298 40 week week NN blog-dshr-org-7824 298 41 , , , blog-dshr-org-7824 298 42 contributors contributor NNS blog-dshr-org-7824 298 43 to to IN blog-dshr-org-7824 298 44 the the DT blog-dshr-org-7824 298 45 PGP PGP NNP blog-dshr-org-7824 298 46 protocol protocol NN blog-dshr-org-7824 298 47 GnuPG GnuPG NNP blog-dshr-org-7824 298 48 noticed notice VBD blog-dshr-org-7824 298 49 that that IN blog-dshr-org-7824 298 50 someone someone NN blog-dshr-org-7824 298 51 was be VBD blog-dshr-org-7824 298 52 “ " `` blog-dshr-org-7824 298 53 poisoning poison VBG blog-dshr-org-7824 298 54 ” " '' blog-dshr-org-7824 298 55 or or CC blog-dshr-org-7824 298 56 “ " `` blog-dshr-org-7824 298 57 flooding flood VBG blog-dshr-org-7824 298 58 ” " '' blog-dshr-org-7824 298 59 their -PRON- PRP$ blog-dshr-org-7824 298 60 certificates certificate NNS blog-dshr-org-7824 298 61 . . . blog-dshr-org-7824 299 1 In in IN blog-dshr-org-7824 299 2 this this DT blog-dshr-org-7824 299 3 case case NN blog-dshr-org-7824 299 4 , , , blog-dshr-org-7824 299 5 poisoning poisoning NN blog-dshr-org-7824 299 6 refers refer VBZ blog-dshr-org-7824 299 7 to to IN blog-dshr-org-7824 299 8 an an DT blog-dshr-org-7824 299 9 attack attack NN blog-dshr-org-7824 299 10 where where WRB blog-dshr-org-7824 299 11 someone someone NN blog-dshr-org-7824 299 12 spams spam VBZ blog-dshr-org-7824 299 13 a a DT blog-dshr-org-7824 299 14 certificate certificate NN blog-dshr-org-7824 299 15 with with IN blog-dshr-org-7824 299 16 a a DT blog-dshr-org-7824 299 17 large large JJ blog-dshr-org-7824 299 18 number number NN blog-dshr-org-7824 299 19 of of IN blog-dshr-org-7824 299 20 signatures signature NNS blog-dshr-org-7824 299 21 or or CC blog-dshr-org-7824 299 22 certifications certification NNS blog-dshr-org-7824 299 23 . . . blog-dshr-org-7824 300 1 This this DT blog-dshr-org-7824 300 2 makes make VBZ blog-dshr-org-7824 300 3 it -PRON- PRP blog-dshr-org-7824 300 4 impossible impossible JJ blog-dshr-org-7824 300 5 for for IN blog-dshr-org-7824 300 6 the the DT blog-dshr-org-7824 300 7 the the DT blog-dshr-org-7824 300 8 PGP PGP NNP blog-dshr-org-7824 300 9 software software NN blog-dshr-org-7824 300 10 that that WDT blog-dshr-org-7824 300 11 people people NNS blog-dshr-org-7824 300 12 use use VBP blog-dshr-org-7824 300 13 to to TO blog-dshr-org-7824 300 14 verify verify VB blog-dshr-org-7824 300 15 its -PRON- PRP$ blog-dshr-org-7824 300 16 authenticity authenticity NN blog-dshr-org-7824 300 17 , , , blog-dshr-org-7824 300 18 which which WDT blog-dshr-org-7824 300 19 can can MD blog-dshr-org-7824 300 20 make make VB blog-dshr-org-7824 300 21 the the DT blog-dshr-org-7824 300 22 software software NN blog-dshr-org-7824 300 23 unusable unusable JJ blog-dshr-org-7824 300 24 or or CC blog-dshr-org-7824 300 25 break break VBP blog-dshr-org-7824 300 26 . . . blog-dshr-org-7824 301 1 In in IN blog-dshr-org-7824 301 2 practice practice NN blog-dshr-org-7824 301 3 , , , blog-dshr-org-7824 301 4 according accord VBG blog-dshr-org-7824 301 5 to to IN blog-dshr-org-7824 301 6 one one CD blog-dshr-org-7824 301 7 of of IN blog-dshr-org-7824 301 8 the the DT blog-dshr-org-7824 301 9 GnuPG GnuPG NNP blog-dshr-org-7824 301 10 developers developer NNS blog-dshr-org-7824 301 11 targeted target VBN blog-dshr-org-7824 301 12 by by IN blog-dshr-org-7824 301 13 this this DT blog-dshr-org-7824 301 14 attack attack NN blog-dshr-org-7824 301 15 , , , blog-dshr-org-7824 301 16 the the DT blog-dshr-org-7824 301 17 hackers hacker NNS blog-dshr-org-7824 301 18 could could MD blog-dshr-org-7824 301 19 make make VB blog-dshr-org-7824 301 20 it -PRON- PRP blog-dshr-org-7824 301 21 impossible impossible JJ blog-dshr-org-7824 301 22 for for IN blog-dshr-org-7824 301 23 people people NNS blog-dshr-org-7824 301 24 using use VBG blog-dshr-org-7824 301 25 Linux Linux NNP blog-dshr-org-7824 301 26 to to TO blog-dshr-org-7824 301 27 download download VB blog-dshr-org-7824 301 28 updates update NNS blog-dshr-org-7824 301 29 , , , blog-dshr-org-7824 301 30 which which WDT blog-dshr-org-7824 301 31 are be VBP blog-dshr-org-7824 301 32 verified verify VBN blog-dshr-org-7824 301 33 via via IN blog-dshr-org-7824 301 34 PGP PGP NNP blog-dshr-org-7824 301 35 . . . blog-dshr-org-7824 301 36 " " '' blog-dshr-org-7824 302 1 The the DT blog-dshr-org-7824 302 2 problem problem NN blog-dshr-org-7824 302 3 lies lie VBZ blog-dshr-org-7824 302 4 in in IN blog-dshr-org-7824 302 5 the the DT blog-dshr-org-7824 302 6 SKS SKS NNP blog-dshr-org-7824 302 7 keyserver keyserver NN blog-dshr-org-7824 302 8 : : : blog-dshr-org-7824 302 9 " " `` blog-dshr-org-7824 302 10 the the DT blog-dshr-org-7824 302 11 SKS SKS NNP blog-dshr-org-7824 302 12 software software NN blog-dshr-org-7824 302 13 was be VBD blog-dshr-org-7824 302 14 written write VBN blog-dshr-org-7824 302 15 in in IN blog-dshr-org-7824 302 16 an an DT blog-dshr-org-7824 302 17 obscure obscure JJ blog-dshr-org-7824 302 18 language language NN blog-dshr-org-7824 302 19 by by IN blog-dshr-org-7824 302 20 a a DT blog-dshr-org-7824 302 21 PhD phd NN blog-dshr-org-7824 302 22 student student NN blog-dshr-org-7824 302 23 for for IN blog-dshr-org-7824 302 24 his -PRON- PRP$ blog-dshr-org-7824 302 25 thesis thesis NN blog-dshr-org-7824 302 26 . . . blog-dshr-org-7824 303 1 And and CC blog-dshr-org-7824 303 2 because because IN blog-dshr-org-7824 303 3 of of IN blog-dshr-org-7824 303 4 that that DT blog-dshr-org-7824 303 5 , , , blog-dshr-org-7824 303 6 according accord VBG blog-dshr-org-7824 303 7 to to IN blog-dshr-org-7824 303 8 Hansen Hansen NNP blog-dshr-org-7824 303 9 , , , blog-dshr-org-7824 303 10 “ " `` blog-dshr-org-7824 303 11 there there EX blog-dshr-org-7824 303 12 is be VBZ blog-dshr-org-7824 303 13 literally literally RB blog-dshr-org-7824 303 14 no no DT blog-dshr-org-7824 303 15 one one NN blog-dshr-org-7824 303 16 in in IN blog-dshr-org-7824 303 17 the the DT blog-dshr-org-7824 303 18 keyserver keyserver NNP blog-dshr-org-7824 303 19 community community NN blog-dshr-org-7824 303 20 who who WP blog-dshr-org-7824 303 21 feels feel VBZ blog-dshr-org-7824 303 22 qualified qualified JJ blog-dshr-org-7824 303 23 to to TO blog-dshr-org-7824 303 24 do do VB blog-dshr-org-7824 303 25 a a DT blog-dshr-org-7824 303 26 serious serious JJ blog-dshr-org-7824 303 27 overhaul overhaul NN blog-dshr-org-7824 303 28 on on IN blog-dshr-org-7824 303 29 the the DT blog-dshr-org-7824 303 30 codebase codebase NN blog-dshr-org-7824 303 31 . . . blog-dshr-org-7824 303 32 ” " '' blog-dshr-org-7824 303 33 In in IN blog-dshr-org-7824 303 34 other other JJ blog-dshr-org-7824 303 35 words word NNS blog-dshr-org-7824 303 36 , , , blog-dshr-org-7824 303 37 these these DT blog-dshr-org-7824 303 38 attacks attack NNS blog-dshr-org-7824 303 39 are be VBP blog-dshr-org-7824 303 40 here here RB blog-dshr-org-7824 303 41 to to TO blog-dshr-org-7824 303 42 stay stay VB blog-dshr-org-7824 303 43 . . . blog-dshr-org-7824 303 44 " " '' blog-dshr-org-7824 304 1 July July NNP blog-dshr-org-7824 304 2 3 3 CD blog-dshr-org-7824 304 3 , , , blog-dshr-org-7824 304 4 2019 2019 CD blog-dshr-org-7824 304 5 at at IN blog-dshr-org-7824 304 6 4:40 4:40 CD blog-dshr-org-7824 304 7 PM PM NNP blog-dshr-org-7824 304 8 David David NNP blog-dshr-org-7824 304 9 . . . blog-dshr-org-7824 305 1 said say VBD blog-dshr-org-7824 305 2 ... ... : blog-dshr-org-7824 305 3 Dan Dan NNP blog-dshr-org-7824 305 4 Goodin Goodin NNP blog-dshr-org-7824 305 5 's 's POS blog-dshr-org-7824 305 6 The the DT blog-dshr-org-7824 305 7 year year NN blog-dshr-org-7824 305 8 - - HYPH blog-dshr-org-7824 305 9 long long JJ blog-dshr-org-7824 305 10 rash rash NN blog-dshr-org-7824 305 11 of of IN blog-dshr-org-7824 305 12 supply supply NN blog-dshr-org-7824 305 13 chain chain NN blog-dshr-org-7824 305 14 attacks attack NNS blog-dshr-org-7824 305 15 against against IN blog-dshr-org-7824 305 16 open open JJ blog-dshr-org-7824 305 17 source source NN blog-dshr-org-7824 305 18 is be VBZ blog-dshr-org-7824 305 19 getting get VBG blog-dshr-org-7824 305 20 worse bad JJR blog-dshr-org-7824 305 21 is be VBZ blog-dshr-org-7824 305 22 a a DT blog-dshr-org-7824 305 23 useful useful JJ blog-dshr-org-7824 305 24 overview overview NN blog-dshr-org-7824 305 25 of of IN blog-dshr-org-7824 305 26 the the DT blog-dshr-org-7824 305 27 recent recent JJ blog-dshr-org-7824 305 28 incidents incident NNS blog-dshr-org-7824 305 29 pointing point VBG blog-dshr-org-7824 305 30 to to IN blog-dshr-org-7824 305 31 the the DT blog-dshr-org-7824 305 32 need need NN blog-dshr-org-7824 305 33 for for IN blog-dshr-org-7824 305 34 verifiable verifiable JJ blog-dshr-org-7824 305 35 logs log NNS blog-dshr-org-7824 305 36 and and CC blog-dshr-org-7824 305 37 reproducible reproducible NN blog-dshr-org-7824 305 38 builds build VBZ blog-dshr-org-7824 305 39 . . . blog-dshr-org-7824 306 1 And and CC blog-dshr-org-7824 306 2 , , , blog-dshr-org-7824 306 3 of of IN blog-dshr-org-7824 306 4 course course NN blog-dshr-org-7824 306 5 , , , blog-dshr-org-7824 306 6 for for IN blog-dshr-org-7824 306 7 requiring require VBG blog-dshr-org-7824 306 8 developers developer NNS blog-dshr-org-7824 306 9 to to TO blog-dshr-org-7824 306 10 use use VB blog-dshr-org-7824 306 11 multi multi JJ blog-dshr-org-7824 306 12 -- -- : blog-dshr-org-7824 306 13 factor factor NN blog-dshr-org-7824 306 14 authentication authentication NN blog-dshr-org-7824 306 15 . . . blog-dshr-org-7824 307 1 August August NNP blog-dshr-org-7824 307 2 21 21 CD blog-dshr-org-7824 307 3 , , , blog-dshr-org-7824 307 4 2019 2019 CD blog-dshr-org-7824 307 5 at at IN blog-dshr-org-7824 307 6 4:43 4:43 CD blog-dshr-org-7824 307 7 PM pm NN blog-dshr-org-7824 307 8 David David NNP blog-dshr-org-7824 307 9 . . . blog-dshr-org-7824 308 1 said say VBD blog-dshr-org-7824 308 2 ... ... : blog-dshr-org-7824 308 3 Catalin Catalin NNP blog-dshr-org-7824 308 4 Cimpanu Cimpanu NNP blog-dshr-org-7824 308 5 's 's POS blog-dshr-org-7824 308 6 Hacking Hacking NNP blog-dshr-org-7824 308 7 20 20 CD blog-dshr-org-7824 308 8 high high JJ blog-dshr-org-7824 308 9 - - HYPH blog-dshr-org-7824 308 10 profile profile NN blog-dshr-org-7824 308 11 dev dev NN blog-dshr-org-7824 308 12 accounts account NNS blog-dshr-org-7824 308 13 could could MD blog-dshr-org-7824 308 14 compromise compromise VB blog-dshr-org-7824 308 15 half half NN blog-dshr-org-7824 308 16 of of IN blog-dshr-org-7824 308 17 the the DT blog-dshr-org-7824 308 18 npm npm NNP blog-dshr-org-7824 308 19 ecosystem ecosystem NNP blog-dshr-org-7824 308 20 is be VBZ blog-dshr-org-7824 308 21 based base VBN blog-dshr-org-7824 308 22 on on IN blog-dshr-org-7824 308 23 Small Small NNP blog-dshr-org-7824 308 24 World World NNP blog-dshr-org-7824 308 25 with with IN blog-dshr-org-7824 308 26 High high JJ blog-dshr-org-7824 308 27 Risks risk NNS blog-dshr-org-7824 308 28 : : : blog-dshr-org-7824 308 29 A a DT blog-dshr-org-7824 308 30 Study Study NNP blog-dshr-org-7824 308 31 of of IN blog-dshr-org-7824 308 32 Security Security NNP blog-dshr-org-7824 308 33 Threats Threats NNPS blog-dshr-org-7824 308 34 in in IN blog-dshr-org-7824 308 35 the the DT blog-dshr-org-7824 308 36 npm npm NN blog-dshr-org-7824 308 37 Ecosystem Ecosystem NNP blog-dshr-org-7824 308 38 by by IN blog-dshr-org-7824 308 39 Marcus Marcus NNP blog-dshr-org-7824 308 40 Zimmerman Zimmerman NNP blog-dshr-org-7824 308 41 et et NNP blog-dshr-org-7824 308 42 al al XX blog-dshr-org-7824 308 43 : : : blog-dshr-org-7824 308 44 " " `` blog-dshr-org-7824 308 45 Their -PRON- PRP$ blog-dshr-org-7824 308 46 goal goal NN blog-dshr-org-7824 308 47 was be VBD blog-dshr-org-7824 308 48 to to TO blog-dshr-org-7824 308 49 get get VB blog-dshr-org-7824 308 50 an an DT blog-dshr-org-7824 308 51 idea idea NN blog-dshr-org-7824 308 52 of of IN blog-dshr-org-7824 308 53 how how WRB blog-dshr-org-7824 308 54 hacking hack VBG blog-dshr-org-7824 308 55 one one CD blog-dshr-org-7824 308 56 or or CC blog-dshr-org-7824 308 57 more more JJR blog-dshr-org-7824 308 58 npm npm FW blog-dshr-org-7824 308 59 maintainer maintainer NN blog-dshr-org-7824 308 60 accounts account NNS blog-dshr-org-7824 308 61 , , , blog-dshr-org-7824 308 62 or or CC blog-dshr-org-7824 308 63 how how WRB blog-dshr-org-7824 308 64 vulnerabilities vulnerability NNS blog-dshr-org-7824 308 65 in in IN blog-dshr-org-7824 308 66 one one CD blog-dshr-org-7824 308 67 or or CC blog-dshr-org-7824 308 68 more more JJR blog-dshr-org-7824 308 69 packages package NNS blog-dshr-org-7824 308 70 , , , blog-dshr-org-7824 308 71 reverberated reverberate VBN blog-dshr-org-7824 308 72 across across IN blog-dshr-org-7824 308 73 the the DT blog-dshr-org-7824 308 74 npm npm NNP blog-dshr-org-7824 308 75 ecosystem ecosystem NN blog-dshr-org-7824 308 76 ; ; : blog-dshr-org-7824 308 77 along along IN blog-dshr-org-7824 308 78 with with IN blog-dshr-org-7824 308 79 the the DT blog-dshr-org-7824 308 80 critical critical JJ blog-dshr-org-7824 308 81 mass mass NN blog-dshr-org-7824 308 82 needed need VBN blog-dshr-org-7824 308 83 to to TO blog-dshr-org-7824 308 84 cause cause VB blog-dshr-org-7824 308 85 security security NN blog-dshr-org-7824 308 86 incidents incident NNS blog-dshr-org-7824 308 87 inside inside IN blog-dshr-org-7824 308 88 tens ten NNS blog-dshr-org-7824 308 89 of of IN blog-dshr-org-7824 308 90 thousands thousand NNS blog-dshr-org-7824 308 91 of of IN blog-dshr-org-7824 308 92 npm npm NN blog-dshr-org-7824 308 93 projects project NNS blog-dshr-org-7824 308 94 at at IN blog-dshr-org-7824 308 95 a a DT blog-dshr-org-7824 308 96 time time NN blog-dshr-org-7824 308 97 . . . blog-dshr-org-7824 309 1 ... ... NFP blog-dshr-org-7824 309 2 the the DT blog-dshr-org-7824 309 3 normal normal JJ blog-dshr-org-7824 309 4 npm npm NN blog-dshr-org-7824 309 5 JavaScript JavaScript NNP blog-dshr-org-7824 309 6 package package NN blog-dshr-org-7824 309 7 has have VBZ blog-dshr-org-7824 309 8 an an DT blog-dshr-org-7824 309 9 abnormally abnormally RB blog-dshr-org-7824 309 10 large large JJ blog-dshr-org-7824 309 11 number number NN blog-dshr-org-7824 309 12 of of IN blog-dshr-org-7824 309 13 dependencies dependency NNS blog-dshr-org-7824 309 14 -- -- : blog-dshr-org-7824 309 15 with with IN blog-dshr-org-7824 309 16 a a DT blog-dshr-org-7824 309 17 package package NN blog-dshr-org-7824 309 18 loading load VBG blog-dshr-org-7824 309 19 79 79 CD blog-dshr-org-7824 309 20 third third JJ blog-dshr-org-7824 309 21 - - HYPH blog-dshr-org-7824 309 22 party party NN blog-dshr-org-7824 309 23 packages package NNS blog-dshr-org-7824 309 24 from from IN blog-dshr-org-7824 309 25 39 39 CD blog-dshr-org-7824 309 26 different different JJ blog-dshr-org-7824 309 27 maintainers maintainer NNS blog-dshr-org-7824 309 28 , , , blog-dshr-org-7824 309 29 on on IN blog-dshr-org-7824 309 30 average average JJ blog-dshr-org-7824 309 31 . . . blog-dshr-org-7824 310 1 This this DT blog-dshr-org-7824 310 2 number number NN blog-dshr-org-7824 310 3 is be VBZ blog-dshr-org-7824 310 4 lower low JJR blog-dshr-org-7824 310 5 for for IN blog-dshr-org-7824 310 6 popular popular JJ blog-dshr-org-7824 310 7 packages package NNS blog-dshr-org-7824 310 8 , , , blog-dshr-org-7824 310 9 which which WDT blog-dshr-org-7824 310 10 only only RB blog-dshr-org-7824 310 11 rely rely VBP blog-dshr-org-7824 310 12 on on IN blog-dshr-org-7824 310 13 code code NN blog-dshr-org-7824 310 14 from from IN blog-dshr-org-7824 310 15 20 20 CD blog-dshr-org-7824 310 16 other other JJ blog-dshr-org-7824 310 17 maintainers maintainer NNS blog-dshr-org-7824 310 18 , , , blog-dshr-org-7824 310 19 on on IN blog-dshr-org-7824 310 20 average average JJ blog-dshr-org-7824 310 21 , , , blog-dshr-org-7824 310 22 but but CC blog-dshr-org-7824 310 23 the the DT blog-dshr-org-7824 310 24 research research NN blog-dshr-org-7824 310 25 team team NN blog-dshr-org-7824 310 26 found find VBD blog-dshr-org-7824 310 27 that that IN blog-dshr-org-7824 310 28 some some DT blog-dshr-org-7824 310 29 popular popular JJ blog-dshr-org-7824 310 30 npm npm NN blog-dshr-org-7824 310 31 packages package NNS blog-dshr-org-7824 310 32 ( ( -LRB- blog-dshr-org-7824 310 33 600 600 CD blog-dshr-org-7824 310 34 ) ) -RRB- blog-dshr-org-7824 310 35 relied rely VBD blog-dshr-org-7824 310 36 on on IN blog-dshr-org-7824 310 37 code code NN blog-dshr-org-7824 310 38 written write VBN blog-dshr-org-7824 310 39 by by IN blog-dshr-org-7824 310 40 more more JJR blog-dshr-org-7824 310 41 than than IN blog-dshr-org-7824 310 42 100 100 CD blog-dshr-org-7824 310 43 maintainers maintainer NNS blog-dshr-org-7824 310 44 . . . blog-dshr-org-7824 311 1 ... ... NFP blog-dshr-org-7824 311 2 " " `` blog-dshr-org-7824 311 3 391 391 CD blog-dshr-org-7824 311 4 highly highly RB blog-dshr-org-7824 311 5 influential influential JJ blog-dshr-org-7824 311 6 maintainers maintainer NNS blog-dshr-org-7824 311 7 affect affect VBP blog-dshr-org-7824 311 8 more more JJR blog-dshr-org-7824 311 9 than than IN blog-dshr-org-7824 311 10 10,000 10,000 CD blog-dshr-org-7824 311 11 packages package NNS blog-dshr-org-7824 311 12 , , , blog-dshr-org-7824 311 13 making make VBG blog-dshr-org-7824 311 14 them -PRON- PRP blog-dshr-org-7824 311 15 prime prime JJ blog-dshr-org-7824 311 16 targets target NNS blog-dshr-org-7824 311 17 for for IN blog-dshr-org-7824 311 18 attacks attack NNS blog-dshr-org-7824 311 19 , , , blog-dshr-org-7824 311 20 " " '' blog-dshr-org-7824 311 21 the the DT blog-dshr-org-7824 311 22 research research NN blog-dshr-org-7824 311 23 team team NN blog-dshr-org-7824 311 24 said say VBD blog-dshr-org-7824 311 25 . . . blog-dshr-org-7824 312 1 " " `` blog-dshr-org-7824 312 2 If if IN blog-dshr-org-7824 312 3 an an DT blog-dshr-org-7824 312 4 attacker attacker NN blog-dshr-org-7824 312 5 manages manage VBZ blog-dshr-org-7824 312 6 to to TO blog-dshr-org-7824 312 7 compromise compromise VB blog-dshr-org-7824 312 8 the the DT blog-dshr-org-7824 312 9 account account NN blog-dshr-org-7824 312 10 of of IN blog-dshr-org-7824 312 11 any any DT blog-dshr-org-7824 312 12 of of IN blog-dshr-org-7824 312 13 the the DT blog-dshr-org-7824 312 14 391 391 CD blog-dshr-org-7824 312 15 most most RBS blog-dshr-org-7824 312 16 influential influential JJ blog-dshr-org-7824 312 17 maintainers maintainer NNS blog-dshr-org-7824 312 18 , , , blog-dshr-org-7824 312 19 the the DT blog-dshr-org-7824 312 20 community community NN blog-dshr-org-7824 312 21 will will MD blog-dshr-org-7824 312 22 experience experience VB blog-dshr-org-7824 312 23 a a DT blog-dshr-org-7824 312 24 serious serious JJ blog-dshr-org-7824 312 25 security security NN blog-dshr-org-7824 312 26 incident incident NN blog-dshr-org-7824 312 27 . . . blog-dshr-org-7824 312 28 " " '' blog-dshr-org-7824 313 1 Furthermore furthermore RB blog-dshr-org-7824 313 2 , , , blog-dshr-org-7824 313 3 in in IN blog-dshr-org-7824 313 4 a a DT blog-dshr-org-7824 313 5 worst bad JJS blog-dshr-org-7824 313 6 - - HYPH blog-dshr-org-7824 313 7 case case NN blog-dshr-org-7824 313 8 scenario scenario NN blog-dshr-org-7824 313 9 where where WRB blog-dshr-org-7824 313 10 multiple multiple JJ blog-dshr-org-7824 313 11 maintainers maintainer NNS blog-dshr-org-7824 313 12 collude collude VBP blog-dshr-org-7824 313 13 , , , blog-dshr-org-7824 313 14 or or CC blog-dshr-org-7824 313 15 a a DT blog-dshr-org-7824 313 16 hacker hacker NN blog-dshr-org-7824 313 17 gains gain VBZ blog-dshr-org-7824 313 18 access access NN blog-dshr-org-7824 313 19 to to IN blog-dshr-org-7824 313 20 a a DT blog-dshr-org-7824 313 21 large large JJ blog-dshr-org-7824 313 22 number number NN blog-dshr-org-7824 313 23 of of IN blog-dshr-org-7824 313 24 accounts account NNS blog-dshr-org-7824 313 25 , , , blog-dshr-org-7824 313 26 the the DT blog-dshr-org-7824 313 27 Darmstadt Darmstadt NNP blog-dshr-org-7824 313 28 team team NN blog-dshr-org-7824 313 29 said say VBD blog-dshr-org-7824 313 30 that that IN blog-dshr-org-7824 313 31 it -PRON- PRP blog-dshr-org-7824 313 32 only only RB blog-dshr-org-7824 313 33 takes take VBZ blog-dshr-org-7824 313 34 access access NN blog-dshr-org-7824 313 35 to to IN blog-dshr-org-7824 313 36 20 20 CD blog-dshr-org-7824 313 37 popular popular JJ blog-dshr-org-7824 313 38 npm npm NN blog-dshr-org-7824 313 39 maintainer maintainer NN blog-dshr-org-7824 313 40 accounts account VBZ blog-dshr-org-7824 313 41 to to TO blog-dshr-org-7824 313 42 deploy deploy VB blog-dshr-org-7824 313 43 malicious malicious JJ blog-dshr-org-7824 313 44 code code NN blog-dshr-org-7824 313 45 impacting impact VBG blog-dshr-org-7824 313 46 more more JJR blog-dshr-org-7824 313 47 than than IN blog-dshr-org-7824 313 48 half half NN blog-dshr-org-7824 313 49 of of IN blog-dshr-org-7824 313 50 the the DT blog-dshr-org-7824 313 51 npm npm NNP blog-dshr-org-7824 313 52 ecosystem ecosystem NNP blog-dshr-org-7824 313 53 . . . blog-dshr-org-7824 313 54 " " '' blog-dshr-org-7824 314 1 October October NNP blog-dshr-org-7824 314 2 18 18 CD blog-dshr-org-7824 314 3 , , , blog-dshr-org-7824 314 4 2019 2019 CD blog-dshr-org-7824 314 5 at at IN blog-dshr-org-7824 314 6 11:55 11:55 CD blog-dshr-org-7824 314 7 AM am NN blog-dshr-org-7824 314 8 David David NNP blog-dshr-org-7824 314 9 . . . blog-dshr-org-7824 315 1 said say VBD blog-dshr-org-7824 315 2 ... ... : blog-dshr-org-7824 315 3 Five five CD blog-dshr-org-7824 315 4 years year NNS blog-dshr-org-7824 315 5 after after IN blog-dshr-org-7824 315 6 the the DT blog-dshr-org-7824 315 7 Equation Equation NNP blog-dshr-org-7824 315 8 Group Group NNP blog-dshr-org-7824 315 9 HDD HDD NNP blog-dshr-org-7824 315 10 hacks hack NNS blog-dshr-org-7824 315 11 , , , blog-dshr-org-7824 315 12 firmware firmware JJ blog-dshr-org-7824 315 13 security security NN blog-dshr-org-7824 315 14 still still RB blog-dshr-org-7824 315 15 sucks suck VBZ blog-dshr-org-7824 315 16 by by IN blog-dshr-org-7824 315 17 Catalin Catalin NNP blog-dshr-org-7824 315 18 Cimpanu Cimpanu NNP blog-dshr-org-7824 315 19 illustrates illustrate VBZ blog-dshr-org-7824 315 20 how how WRB blog-dshr-org-7824 315 21 far far RB blog-dshr-org-7824 315 22 disk disk NN blog-dshr-org-7824 315 23 drive drive NN blog-dshr-org-7824 315 24 firmware firmware NN blog-dshr-org-7824 315 25 security security NN blog-dshr-org-7824 315 26 is be VBZ blog-dshr-org-7824 315 27 ahead ahead RB blog-dshr-org-7824 315 28 of of IN blog-dshr-org-7824 315 29 the the DT blog-dshr-org-7824 315 30 rest rest NN blog-dshr-org-7824 315 31 of of IN blog-dshr-org-7824 315 32 the the DT blog-dshr-org-7824 315 33 device device NN blog-dshr-org-7824 315 34 firmware firmware NN blog-dshr-org-7824 315 35 world world NN blog-dshr-org-7824 315 36 : : : blog-dshr-org-7824 315 37 " " `` blog-dshr-org-7824 315 38 In in IN blog-dshr-org-7824 315 39 2015 2015 CD blog-dshr-org-7824 315 40 , , , blog-dshr-org-7824 315 41 security security NN blog-dshr-org-7824 315 42 researchers researcher NNS blog-dshr-org-7824 315 43 from from IN blog-dshr-org-7824 315 44 Kaspersky Kaspersky NNP blog-dshr-org-7824 315 45 discovered discover VBD blog-dshr-org-7824 315 46 a a DT blog-dshr-org-7824 315 47 novel novel JJ blog-dshr-org-7824 315 48 type type NN blog-dshr-org-7824 315 49 of of IN blog-dshr-org-7824 315 50 malware malware NN blog-dshr-org-7824 315 51 that that WDT blog-dshr-org-7824 315 52 nobody nobody NN blog-dshr-org-7824 315 53 else else RB blog-dshr-org-7824 315 54 had have VBD blog-dshr-org-7824 315 55 seen see VBN blog-dshr-org-7824 315 56 before before RB blog-dshr-org-7824 315 57 until until IN blog-dshr-org-7824 315 58 then then RB blog-dshr-org-7824 315 59 . . . blog-dshr-org-7824 316 1 The the DT blog-dshr-org-7824 316 2 malware malware NN blog-dshr-org-7824 316 3 , , , blog-dshr-org-7824 316 4 known know VBN blog-dshr-org-7824 316 5 as as IN blog-dshr-org-7824 316 6 NLS_933.dll NLS_933.dll NNP blog-dshr-org-7824 316 7 , , , blog-dshr-org-7824 316 8 had have VBD blog-dshr-org-7824 316 9 the the DT blog-dshr-org-7824 316 10 ability ability NN blog-dshr-org-7824 316 11 to to TO blog-dshr-org-7824 316 12 rewrite rewrite VB blog-dshr-org-7824 316 13 HDD HDD NNP blog-dshr-org-7824 316 14 firmware firmware NN blog-dshr-org-7824 316 15 for for IN blog-dshr-org-7824 316 16 a a DT blog-dshr-org-7824 316 17 dozen dozen NN blog-dshr-org-7824 316 18 of of IN blog-dshr-org-7824 316 19 HDD HDD NNP blog-dshr-org-7824 316 20 brands brand NNS blog-dshr-org-7824 316 21 to to TO blog-dshr-org-7824 316 22 plant plant VB blog-dshr-org-7824 316 23 persistent persistent JJ blog-dshr-org-7824 316 24 backdoors backdoor NNS blog-dshr-org-7824 316 25 . . . blog-dshr-org-7824 317 1 Kaspersky Kaspersky NNP blog-dshr-org-7824 317 2 said say VBD blog-dshr-org-7824 317 3 the the DT blog-dshr-org-7824 317 4 malware malware NN blog-dshr-org-7824 317 5 was be VBD blog-dshr-org-7824 317 6 used use VBN blog-dshr-org-7824 317 7 in in IN blog-dshr-org-7824 317 8 attacks attack NNS blog-dshr-org-7824 317 9 against against IN blog-dshr-org-7824 317 10 systems system NNS blog-dshr-org-7824 317 11 all all RB blog-dshr-org-7824 317 12 over over IN blog-dshr-org-7824 317 13 the the DT blog-dshr-org-7824 317 14 world world NN blog-dshr-org-7824 317 15 . . . blog-dshr-org-7824 318 1 Kaspersky kaspersky JJ blog-dshr-org-7824 318 2 researchers researcher NNS blog-dshr-org-7824 318 3 claimed claim VBD blog-dshr-org-7824 318 4 the the DT blog-dshr-org-7824 318 5 malware malware NN blog-dshr-org-7824 318 6 was be VBD blog-dshr-org-7824 318 7 developed develop VBN blog-dshr-org-7824 318 8 by by IN blog-dshr-org-7824 318 9 a a DT blog-dshr-org-7824 318 10 hacker hacker NN blog-dshr-org-7824 318 11 group group NN blog-dshr-org-7824 318 12 known know VBN blog-dshr-org-7824 318 13 as as IN blog-dshr-org-7824 318 14 the the DT blog-dshr-org-7824 318 15 Equation Equation NNP blog-dshr-org-7824 318 16 Group Group NNP blog-dshr-org-7824 318 17 , , , blog-dshr-org-7824 318 18 a a DT blog-dshr-org-7824 318 19 codename codename NN blog-dshr-org-7824 318 20 that that WDT blog-dshr-org-7824 318 21 was be VBD blog-dshr-org-7824 318 22 later later RB blog-dshr-org-7824 318 23 associated associate VBN blog-dshr-org-7824 318 24 with with IN blog-dshr-org-7824 318 25 the the DT blog-dshr-org-7824 318 26 US US NNP blog-dshr-org-7824 318 27 National National NNP blog-dshr-org-7824 318 28 Security Security NNP blog-dshr-org-7824 318 29 Agency Agency NNP blog-dshr-org-7824 318 30 ( ( -LRB- blog-dshr-org-7824 318 31 NSA NSA NNP blog-dshr-org-7824 318 32 ) ) -RRB- blog-dshr-org-7824 318 33 . . . blog-dshr-org-7824 319 1 Knowing know VBG blog-dshr-org-7824 319 2 that that IN blog-dshr-org-7824 319 3 the the DT blog-dshr-org-7824 319 4 NSA NSA NNP blog-dshr-org-7824 319 5 was be VBD blog-dshr-org-7824 319 6 spying spy VBG blog-dshr-org-7824 319 7 on on IN blog-dshr-org-7824 319 8 their -PRON- PRP$ blog-dshr-org-7824 319 9 customers customer NNS blog-dshr-org-7824 319 10 led lead VBD blog-dshr-org-7824 319 11 many many JJ blog-dshr-org-7824 319 12 HDD HDD NNP blog-dshr-org-7824 319 13 and and CC blog-dshr-org-7824 319 14 SSD SSD NNP blog-dshr-org-7824 319 15 vendors vendor NNS blog-dshr-org-7824 319 16 to to TO blog-dshr-org-7824 319 17 improve improve VB blog-dshr-org-7824 319 18 the the DT blog-dshr-org-7824 319 19 security security NN blog-dshr-org-7824 319 20 of of IN blog-dshr-org-7824 319 21 their -PRON- PRP$ blog-dshr-org-7824 319 22 firmware firmware NN blog-dshr-org-7824 319 23 , , , blog-dshr-org-7824 319 24 Eclypsium Eclypsium NNP blog-dshr-org-7824 319 25 said say VBD blog-dshr-org-7824 319 26 . . . blog-dshr-org-7824 320 1 However however RB blog-dshr-org-7824 320 2 , , , blog-dshr-org-7824 320 3 five five CD blog-dshr-org-7824 320 4 years year NNS blog-dshr-org-7824 320 5 since since IN blog-dshr-org-7824 320 6 the the DT blog-dshr-org-7824 320 7 Equation Equation NNP blog-dshr-org-7824 320 8 Group Group NNP blog-dshr-org-7824 320 9 's 's POS blog-dshr-org-7824 320 10 HDD HDD NNP blog-dshr-org-7824 320 11 implants implant NNS blog-dshr-org-7824 320 12 were be VBD blog-dshr-org-7824 320 13 found find VBN blog-dshr-org-7824 320 14 in in IN blog-dshr-org-7824 320 15 the the DT blog-dshr-org-7824 320 16 wild wild NN blog-dshr-org-7824 320 17 and and CC blog-dshr-org-7824 320 18 introduced introduce VBD blog-dshr-org-7824 320 19 the the DT blog-dshr-org-7824 320 20 hardware hardware NN blog-dshr-org-7824 320 21 industry industry NN blog-dshr-org-7824 320 22 to to IN blog-dshr-org-7824 320 23 the the DT blog-dshr-org-7824 320 24 power power NN blog-dshr-org-7824 320 25 of of IN blog-dshr-org-7824 320 26 firmware firmware JJ blog-dshr-org-7824 320 27 hacking hacking NN blog-dshr-org-7824 320 28 , , , blog-dshr-org-7824 320 29 Eclypsium Eclypsium NNP blog-dshr-org-7824 320 30 says say VBZ blog-dshr-org-7824 320 31 vendors vendor NNS blog-dshr-org-7824 320 32 have have VBP blog-dshr-org-7824 320 33 only only RB blog-dshr-org-7824 320 34 partially partially RB blog-dshr-org-7824 320 35 addressed address VBN blog-dshr-org-7824 320 36 this this DT blog-dshr-org-7824 320 37 problem problem NN blog-dshr-org-7824 320 38 . . . blog-dshr-org-7824 321 1 " " `` blog-dshr-org-7824 321 2 After after IN blog-dshr-org-7824 321 3 the the DT blog-dshr-org-7824 321 4 disclosure disclosure NN blog-dshr-org-7824 321 5 of of IN blog-dshr-org-7824 321 6 the the DT blog-dshr-org-7824 321 7 Equation Equation NNP blog-dshr-org-7824 321 8 Group Group NNP blog-dshr-org-7824 321 9 's 's POS blog-dshr-org-7824 321 10 drive drive NN blog-dshr-org-7824 321 11 implants implant NNS blog-dshr-org-7824 321 12 , , , blog-dshr-org-7824 321 13 many many JJ blog-dshr-org-7824 321 14 HDD HDD NNP blog-dshr-org-7824 321 15 and and CC blog-dshr-org-7824 321 16 SSD SSD NNP blog-dshr-org-7824 321 17 vendors vendor NNS blog-dshr-org-7824 321 18 made make VBD blog-dshr-org-7824 321 19 changes change NNS blog-dshr-org-7824 321 20 to to TO blog-dshr-org-7824 321 21 ensure ensure VB blog-dshr-org-7824 321 22 their -PRON- PRP$ blog-dshr-org-7824 321 23 components component NNS blog-dshr-org-7824 321 24 would would MD blog-dshr-org-7824 321 25 only only RB blog-dshr-org-7824 321 26 accept accept VB blog-dshr-org-7824 321 27 valid valid JJ blog-dshr-org-7824 321 28 firmware firmware NN blog-dshr-org-7824 321 29 . . . blog-dshr-org-7824 322 1 However however RB blog-dshr-org-7824 322 2 , , , blog-dshr-org-7824 322 3 many many JJ blog-dshr-org-7824 322 4 of of IN blog-dshr-org-7824 322 5 the the DT blog-dshr-org-7824 322 6 other other JJ blog-dshr-org-7824 322 7 peripheral peripheral JJ blog-dshr-org-7824 322 8 components component NNS blog-dshr-org-7824 322 9 have have VBP blog-dshr-org-7824 322 10 yet yet RB blog-dshr-org-7824 322 11 to to TO blog-dshr-org-7824 322 12 follow follow VB blog-dshr-org-7824 322 13 suit suit NN blog-dshr-org-7824 322 14 , , , blog-dshr-org-7824 322 15 " " '' blog-dshr-org-7824 322 16 researchers researcher NNS blog-dshr-org-7824 322 17 said say VBD blog-dshr-org-7824 322 18 . . . blog-dshr-org-7824 322 19 " " '' blog-dshr-org-7824 323 1 February February NNP blog-dshr-org-7824 323 2 20 20 CD blog-dshr-org-7824 323 3 , , , blog-dshr-org-7824 323 4 2020 2020 CD blog-dshr-org-7824 323 5 at at IN blog-dshr-org-7824 323 6 5:23 5:23 CD blog-dshr-org-7824 323 7 PM pm NN blog-dshr-org-7824 323 8 David David NNP blog-dshr-org-7824 323 9 . . . blog-dshr-org-7824 324 1 said say VBD blog-dshr-org-7824 324 2 ... ... : blog-dshr-org-7824 324 3 Marc Marc NNP blog-dshr-org-7824 324 4 Ohm Ohm NNP blog-dshr-org-7824 324 5 et et FW blog-dshr-org-7824 324 6 al al NNP blog-dshr-org-7824 324 7 analyze analyze VB blog-dshr-org-7824 324 8 supply supply NN blog-dshr-org-7824 324 9 chain chain NN blog-dshr-org-7824 324 10 attacks attack NNS blog-dshr-org-7824 324 11 via via IN blog-dshr-org-7824 324 12 open open JJ blog-dshr-org-7824 324 13 source source NN blog-dshr-org-7824 324 14 packages package NNS blog-dshr-org-7824 324 15 in in IN blog-dshr-org-7824 324 16 three three CD blog-dshr-org-7824 324 17 reposiotries reposiotrie NNS blog-dshr-org-7824 324 18 in in IN blog-dshr-org-7824 324 19 Backstabber Backstabber NNP blog-dshr-org-7824 324 20 ’s ’s POS blog-dshr-org-7824 324 21 Knife Knife NNP blog-dshr-org-7824 324 22 Collection Collection NNP blog-dshr-org-7824 324 23 : : : blog-dshr-org-7824 324 24 A a DT blog-dshr-org-7824 324 25 Review Review NNP blog-dshr-org-7824 324 26 of of IN blog-dshr-org-7824 324 27 Open Open NNP blog-dshr-org-7824 324 28 Source Source NNP blog-dshr-org-7824 324 29 Software Software NNP blog-dshr-org-7824 324 30 Supply Supply NNP blog-dshr-org-7824 324 31 Chain chain NN blog-dshr-org-7824 324 32 Attacks attack NNS blog-dshr-org-7824 324 33 : : : blog-dshr-org-7824 324 34 " " `` blog-dshr-org-7824 324 35 This this DT blog-dshr-org-7824 324 36 paper paper NN blog-dshr-org-7824 324 37 presents present VBZ blog-dshr-org-7824 324 38 a a DT blog-dshr-org-7824 324 39 dataset dataset NN blog-dshr-org-7824 324 40 of of IN blog-dshr-org-7824 324 41 174 174 CD blog-dshr-org-7824 324 42 malicious malicious JJ blog-dshr-org-7824 324 43 software software NN blog-dshr-org-7824 324 44 packages package NNS blog-dshr-org-7824 324 45 that that WDT blog-dshr-org-7824 324 46 were be VBD blog-dshr-org-7824 324 47 used use VBN blog-dshr-org-7824 324 48 in in IN blog-dshr-org-7824 324 49 real real JJ blog-dshr-org-7824 324 50 - - HYPH blog-dshr-org-7824 324 51 world world NN blog-dshr-org-7824 324 52 attacks attack NNS blog-dshr-org-7824 324 53 on on IN blog-dshr-org-7824 324 54 open open JJ blog-dshr-org-7824 324 55 source source NN blog-dshr-org-7824 324 56 software software NN blog-dshr-org-7824 324 57 supply supply NN blog-dshr-org-7824 324 58 chains chain NNS blog-dshr-org-7824 324 59 , , , blog-dshr-org-7824 324 60 and and CC blog-dshr-org-7824 324 61 which which WDT blog-dshr-org-7824 324 62 were be VBD blog-dshr-org-7824 324 63 distributed distribute VBN blog-dshr-org-7824 324 64 via via IN blog-dshr-org-7824 324 65 the the DT blog-dshr-org-7824 324 66 popular popular JJ blog-dshr-org-7824 324 67 package package NN blog-dshr-org-7824 324 68 repositories repositorie VBZ blog-dshr-org-7824 324 69 npm npm NN blog-dshr-org-7824 324 70 , , , blog-dshr-org-7824 324 71 PyPI pypi NN blog-dshr-org-7824 324 72 , , , blog-dshr-org-7824 324 73 and and CC blog-dshr-org-7824 324 74 RubyGems RubyGems NNP blog-dshr-org-7824 324 75 . . . blog-dshr-org-7824 325 1 Those those DT blog-dshr-org-7824 325 2 packages package NNS blog-dshr-org-7824 325 3 , , , blog-dshr-org-7824 325 4 dating date VBG blog-dshr-org-7824 325 5 from from IN blog-dshr-org-7824 325 6 November November NNP blog-dshr-org-7824 325 7 2015 2015 CD blog-dshr-org-7824 325 8 to to IN blog-dshr-org-7824 325 9 November November NNP blog-dshr-org-7824 325 10 2019 2019 CD blog-dshr-org-7824 325 11 , , , blog-dshr-org-7824 325 12 were be VBD blog-dshr-org-7824 325 13 manually manually RB blog-dshr-org-7824 325 14 collected collect VBN blog-dshr-org-7824 325 15 and and CC blog-dshr-org-7824 325 16 analyzed analyze VBN blog-dshr-org-7824 325 17 . . . blog-dshr-org-7824 326 1 The the DT blog-dshr-org-7824 326 2 paper paper NN blog-dshr-org-7824 326 3 also also RB blog-dshr-org-7824 326 4 presents present VBZ blog-dshr-org-7824 326 5 two two CD blog-dshr-org-7824 326 6 general general JJ blog-dshr-org-7824 326 7 attack attack NN blog-dshr-org-7824 326 8 trees tree NNS blog-dshr-org-7824 326 9 to to TO blog-dshr-org-7824 326 10 provide provide VB blog-dshr-org-7824 326 11 a a DT blog-dshr-org-7824 326 12 structured structured JJ blog-dshr-org-7824 326 13 overview overview NN blog-dshr-org-7824 326 14 about about IN blog-dshr-org-7824 326 15 techniques technique NNS blog-dshr-org-7824 326 16 to to TO blog-dshr-org-7824 326 17 inject inject VB blog-dshr-org-7824 326 18 malicious malicious JJ blog-dshr-org-7824 326 19 code code NN blog-dshr-org-7824 326 20 into into IN blog-dshr-org-7824 326 21 the the DT blog-dshr-org-7824 326 22 dependency dependency NN blog-dshr-org-7824 326 23 tree tree NN blog-dshr-org-7824 326 24 of of IN blog-dshr-org-7824 326 25 downstream downstream JJ blog-dshr-org-7824 326 26 users user NNS blog-dshr-org-7824 326 27 , , , blog-dshr-org-7824 326 28 and and CC blog-dshr-org-7824 326 29 to to TO blog-dshr-org-7824 326 30 execute execute VB blog-dshr-org-7824 326 31 such such JJ blog-dshr-org-7824 326 32 code code NN blog-dshr-org-7824 326 33 at at IN blog-dshr-org-7824 326 34 different different JJ blog-dshr-org-7824 326 35 times time NNS blog-dshr-org-7824 326 36 and and CC blog-dshr-org-7824 326 37 under under IN blog-dshr-org-7824 326 38 different different JJ blog-dshr-org-7824 326 39 conditions condition NNS blog-dshr-org-7824 326 40 . . . blog-dshr-org-7824 326 41 " " '' blog-dshr-org-7824 327 1 May May NNP blog-dshr-org-7824 327 2 30 30 CD blog-dshr-org-7824 327 3 , , , blog-dshr-org-7824 327 4 2020 2020 CD blog-dshr-org-7824 327 5 at at IN blog-dshr-org-7824 327 6 7:37 7:37 CD blog-dshr-org-7824 327 7 AM am NN blog-dshr-org-7824 327 8 David David NNP blog-dshr-org-7824 327 9 . . . blog-dshr-org-7824 328 1 said say VBD blog-dshr-org-7824 328 2 ... ... : blog-dshr-org-7824 328 3 Bruce Bruce NNP blog-dshr-org-7824 328 4 Schneier Schneier NNP blog-dshr-org-7824 328 5 's 's POS blog-dshr-org-7824 328 6 Survey Survey NNP blog-dshr-org-7824 328 7 of of IN blog-dshr-org-7824 328 8 Supply Supply NNP blog-dshr-org-7824 328 9 Chain Chain NNP blog-dshr-org-7824 328 10 Attacks Attacks NNPS blog-dshr-org-7824 328 11 starts start VBZ blog-dshr-org-7824 328 12 : : : blog-dshr-org-7824 328 13 " " `` blog-dshr-org-7824 328 14 The the DT blog-dshr-org-7824 328 15 Atlantic Atlantic NNP blog-dshr-org-7824 328 16 Council Council NNP blog-dshr-org-7824 328 17 has have VBZ blog-dshr-org-7824 328 18 a a DT blog-dshr-org-7824 328 19 released release VBN blog-dshr-org-7824 328 20 a a DT blog-dshr-org-7824 328 21 report report NN blog-dshr-org-7824 328 22 that that WDT blog-dshr-org-7824 328 23 looks look VBZ blog-dshr-org-7824 328 24 at at IN blog-dshr-org-7824 328 25 the the DT blog-dshr-org-7824 328 26 history history NN blog-dshr-org-7824 328 27 of of IN blog-dshr-org-7824 328 28 computer computer NN blog-dshr-org-7824 328 29 supply supply NN blog-dshr-org-7824 328 30 chain chain NN blog-dshr-org-7824 328 31 attacks attack NNS blog-dshr-org-7824 328 32 . . . blog-dshr-org-7824 328 33 " " '' blog-dshr-org-7824 329 1 The the DT blog-dshr-org-7824 329 2 Atlantic Atlantic NNP blog-dshr-org-7824 329 3 Council Council NNP blog-dshr-org-7824 329 4 also also RB blog-dshr-org-7824 329 5 has have VBZ blog-dshr-org-7824 329 6 a a DT blog-dshr-org-7824 329 7 summary summary NN blog-dshr-org-7824 329 8 of of IN blog-dshr-org-7824 329 9 the the DT blog-dshr-org-7824 329 10 report report NN blog-dshr-org-7824 329 11 entitled entitle VBN blog-dshr-org-7824 329 12 Breaking Breaking NNP blog-dshr-org-7824 329 13 trust trust NN blog-dshr-org-7824 329 14 : : : blog-dshr-org-7824 329 15 Shades shade NNS blog-dshr-org-7824 329 16 of of IN blog-dshr-org-7824 329 17 crisis crisis NN blog-dshr-org-7824 329 18 across across IN blog-dshr-org-7824 329 19 an an DT blog-dshr-org-7824 329 20 insecure insecure JJ blog-dshr-org-7824 329 21 software software NN blog-dshr-org-7824 329 22 supply supply NN blog-dshr-org-7824 329 23 chain chain NN blog-dshr-org-7824 329 24 : : : blog-dshr-org-7824 329 25 " " `` blog-dshr-org-7824 329 26 Software software NN blog-dshr-org-7824 329 27 supply supply NN blog-dshr-org-7824 329 28 chain chain NN blog-dshr-org-7824 329 29 security security NN blog-dshr-org-7824 329 30 remains remain VBZ blog-dshr-org-7824 329 31 an an DT blog-dshr-org-7824 329 32 under under RB blog-dshr-org-7824 329 33 - - HYPH blog-dshr-org-7824 329 34 appreciated appreciate VBN blog-dshr-org-7824 329 35 domain domain NN blog-dshr-org-7824 329 36 of of IN blog-dshr-org-7824 329 37 national national JJ blog-dshr-org-7824 329 38 security security NN blog-dshr-org-7824 329 39 policymaking policymaking NN blog-dshr-org-7824 329 40 . . . blog-dshr-org-7824 330 1 Working work VBG blog-dshr-org-7824 330 2 to to TO blog-dshr-org-7824 330 3 improve improve VB blog-dshr-org-7824 330 4 the the DT blog-dshr-org-7824 330 5 security security NN blog-dshr-org-7824 330 6 of of IN blog-dshr-org-7824 330 7 software software NN blog-dshr-org-7824 330 8 supporting support VBG blog-dshr-org-7824 330 9 private private JJ blog-dshr-org-7824 330 10 sector sector NN blog-dshr-org-7824 330 11 enterprise enterprise NN blog-dshr-org-7824 330 12 as as RB blog-dshr-org-7824 330 13 well well RB blog-dshr-org-7824 330 14 as as IN blog-dshr-org-7824 330 15 sensitive sensitive JJ blog-dshr-org-7824 330 16 Defense Defense NNP blog-dshr-org-7824 330 17 and and CC blog-dshr-org-7824 330 18 Intelligence Intelligence NNP blog-dshr-org-7824 330 19 organizations organization NNS blog-dshr-org-7824 330 20 requires require VBZ blog-dshr-org-7824 330 21 more more RBR blog-dshr-org-7824 330 22 coherent coherent JJ blog-dshr-org-7824 330 23 policy policy NN blog-dshr-org-7824 330 24 response response NN blog-dshr-org-7824 330 25 together together RB blog-dshr-org-7824 330 26 industry industry NN blog-dshr-org-7824 330 27 and and CC blog-dshr-org-7824 330 28 open open JJ blog-dshr-org-7824 330 29 source source NN blog-dshr-org-7824 330 30 communities community NNS blog-dshr-org-7824 330 31 . . . blog-dshr-org-7824 331 1 This this DT blog-dshr-org-7824 331 2 report report NN blog-dshr-org-7824 331 3 profiles profile VBZ blog-dshr-org-7824 331 4 115 115 CD blog-dshr-org-7824 331 5 attacks attack NNS blog-dshr-org-7824 331 6 and and CC blog-dshr-org-7824 331 7 disclosures disclosure NNS blog-dshr-org-7824 331 8 against against IN blog-dshr-org-7824 331 9 the the DT blog-dshr-org-7824 331 10 software software NN blog-dshr-org-7824 331 11 supply supply NN blog-dshr-org-7824 331 12 chain chain NN blog-dshr-org-7824 331 13 from from IN blog-dshr-org-7824 331 14 the the DT blog-dshr-org-7824 331 15 past past JJ blog-dshr-org-7824 331 16 decade decade NN blog-dshr-org-7824 331 17 to to TO blog-dshr-org-7824 331 18 highlight highlight VB blog-dshr-org-7824 331 19 the the DT blog-dshr-org-7824 331 20 need need NN blog-dshr-org-7824 331 21 for for IN blog-dshr-org-7824 331 22 action action NN blog-dshr-org-7824 331 23 and and CC blog-dshr-org-7824 331 24 presents present VBZ blog-dshr-org-7824 331 25 recommendations recommendation NNS blog-dshr-org-7824 331 26 to to TO blog-dshr-org-7824 331 27 both both DT blog-dshr-org-7824 331 28 raise raise VB blog-dshr-org-7824 331 29 the the DT blog-dshr-org-7824 331 30 cost cost NN blog-dshr-org-7824 331 31 of of IN blog-dshr-org-7824 331 32 these these DT blog-dshr-org-7824 331 33 attacks attack NNS blog-dshr-org-7824 331 34 and and CC blog-dshr-org-7824 331 35 limit limit VB blog-dshr-org-7824 331 36 their -PRON- PRP$ blog-dshr-org-7824 331 37 harm harm NN blog-dshr-org-7824 331 38 . . . blog-dshr-org-7824 331 39 " " '' blog-dshr-org-7824 332 1 July July NNP blog-dshr-org-7824 332 2 29 29 CD blog-dshr-org-7824 332 3 , , , blog-dshr-org-7824 332 4 2020 2020 CD blog-dshr-org-7824 332 5 at at IN blog-dshr-org-7824 332 6 4:56 4:56 CD blog-dshr-org-7824 332 7 PM PM NNP blog-dshr-org-7824 332 8 David David NNP blog-dshr-org-7824 332 9 . . . blog-dshr-org-7824 333 1 said say VBD blog-dshr-org-7824 333 2 ... ... : blog-dshr-org-7824 334 1 Via via IN blog-dshr-org-7824 334 2 my -PRON- PRP$ blog-dshr-org-7824 334 3 friend friend NN blog-dshr-org-7824 334 4 Jim Jim NNP blog-dshr-org-7824 334 5 Gettys Gettys NNP blog-dshr-org-7824 334 6 , , , blog-dshr-org-7824 334 7 we -PRON- PRP blog-dshr-org-7824 334 8 learn learn VBP blog-dshr-org-7824 334 9 of of IN blog-dshr-org-7824 334 10 a a DT blog-dshr-org-7824 334 11 major major JJ blog-dshr-org-7824 334 12 milestone milestone NN blog-dshr-org-7824 334 13 in in IN blog-dshr-org-7824 334 14 the the DT blog-dshr-org-7824 334 15 development development NN blog-dshr-org-7824 334 16 of of IN blog-dshr-org-7824 334 17 a a DT blog-dshr-org-7824 334 18 truly truly RB blog-dshr-org-7824 334 19 reproducible reproducible JJ blog-dshr-org-7824 334 20 build build NN blog-dshr-org-7824 334 21 environment environment NN blog-dshr-org-7824 334 22 . . . blog-dshr-org-7824 335 1 Last last JJ blog-dshr-org-7824 335 2 June June NNP blog-dshr-org-7824 335 3 Jan Jan NNP blog-dshr-org-7824 335 4 Nieuwenhuizen Nieuwenhuizen NNP blog-dshr-org-7824 335 5 posted post VBD blog-dshr-org-7824 335 6 Guix Guix NNP blog-dshr-org-7824 335 7 Further further RB blog-dshr-org-7824 335 8 Reduces reduce VBZ blog-dshr-org-7824 335 9 Bootstrap Bootstrap NNP blog-dshr-org-7824 335 10 Seed seed NN blog-dshr-org-7824 335 11 to to IN blog-dshr-org-7824 335 12 25 25 CD blog-dshr-org-7824 335 13 % % NN blog-dshr-org-7824 335 14 . . . blog-dshr-org-7824 336 1 The the DT blog-dshr-org-7824 336 2 TL;DR TL;DR NNS blog-dshr-org-7824 336 3 is be VBZ blog-dshr-org-7824 336 4 : : : blog-dshr-org-7824 336 5 " " `` blog-dshr-org-7824 336 6 GNU GNU NNP blog-dshr-org-7824 336 7 Mes Mes NNP blog-dshr-org-7824 336 8 is be VBZ blog-dshr-org-7824 336 9 closely closely RB blog-dshr-org-7824 336 10 related relate VBN blog-dshr-org-7824 336 11 to to IN blog-dshr-org-7824 336 12 the the DT blog-dshr-org-7824 336 13 Bootstrappable Bootstrappable NNP blog-dshr-org-7824 336 14 Builds Builds NNPS blog-dshr-org-7824 336 15 project project NN blog-dshr-org-7824 336 16 . . . blog-dshr-org-7824 337 1 Mes Mes NNP blog-dshr-org-7824 337 2 aims aim VBZ blog-dshr-org-7824 337 3 to to TO blog-dshr-org-7824 337 4 create create VB blog-dshr-org-7824 337 5 an an DT blog-dshr-org-7824 337 6 entirely entirely RB blog-dshr-org-7824 337 7 source source NN blog-dshr-org-7824 337 8 - - HYPH blog-dshr-org-7824 337 9 based base VBN blog-dshr-org-7824 337 10 bootstrapping bootstrappe VBG blog-dshr-org-7824 337 11 path path NN blog-dshr-org-7824 337 12 for for IN blog-dshr-org-7824 337 13 the the DT blog-dshr-org-7824 337 14 Guix Guix NNP blog-dshr-org-7824 337 15 System System NNP blog-dshr-org-7824 337 16 and and CC blog-dshr-org-7824 337 17 other other JJ blog-dshr-org-7824 337 18 interested interested JJ blog-dshr-org-7824 337 19 GNU GNU NNP blog-dshr-org-7824 337 20 / / SYM blog-dshr-org-7824 337 21 Linux Linux NNP blog-dshr-org-7824 337 22 distributions distribution NNS blog-dshr-org-7824 337 23 . . . blog-dshr-org-7824 338 1 The the DT blog-dshr-org-7824 338 2 goal goal NN blog-dshr-org-7824 338 3 is be VBZ blog-dshr-org-7824 338 4 to to TO blog-dshr-org-7824 338 5 start start VB blog-dshr-org-7824 338 6 from from IN blog-dshr-org-7824 338 7 a a DT blog-dshr-org-7824 338 8 minimal minimal JJ blog-dshr-org-7824 338 9 , , , blog-dshr-org-7824 338 10 easily easily RB blog-dshr-org-7824 338 11 inspectable inspectable JJ blog-dshr-org-7824 338 12 binary binary NN blog-dshr-org-7824 338 13 ( ( -LRB- blog-dshr-org-7824 338 14 which which WDT blog-dshr-org-7824 338 15 should should MD blog-dshr-org-7824 338 16 be be VB blog-dshr-org-7824 338 17 readable readable JJ blog-dshr-org-7824 338 18 as as IN blog-dshr-org-7824 338 19 source source NN blog-dshr-org-7824 338 20 ) ) -RRB- blog-dshr-org-7824 338 21 and and CC blog-dshr-org-7824 338 22 bootstrap bootstrap VB blog-dshr-org-7824 338 23 into into IN blog-dshr-org-7824 338 24 something something NN blog-dshr-org-7824 338 25 close close JJ blog-dshr-org-7824 338 26 to to IN blog-dshr-org-7824 338 27 R6RS r6rs ADD blog-dshr-org-7824 338 28 Scheme Scheme NNP blog-dshr-org-7824 338 29 . . . blog-dshr-org-7824 339 1 Currently currently RB blog-dshr-org-7824 339 2 , , , blog-dshr-org-7824 339 3 Mes Mes NNP blog-dshr-org-7824 339 4 consists consist VBZ blog-dshr-org-7824 339 5 of of IN blog-dshr-org-7824 339 6 a a DT blog-dshr-org-7824 339 7 mutual mutual JJ blog-dshr-org-7824 339 8 self self NN blog-dshr-org-7824 339 9 - - HYPH blog-dshr-org-7824 339 10 hosting host VBG blog-dshr-org-7824 339 11 scheme scheme NN blog-dshr-org-7824 339 12 interpreter interpreter NN blog-dshr-org-7824 339 13 and and CC blog-dshr-org-7824 339 14 C C NNP blog-dshr-org-7824 339 15 compiler compiler NN blog-dshr-org-7824 339 16 . . . blog-dshr-org-7824 340 1 It -PRON- PRP blog-dshr-org-7824 340 2 also also RB blog-dshr-org-7824 340 3 implements implement VBZ blog-dshr-org-7824 340 4 a a DT blog-dshr-org-7824 340 5 C C NNP blog-dshr-org-7824 340 6 library library NN blog-dshr-org-7824 340 7 . . . blog-dshr-org-7824 341 1 Mes Mes NNP blog-dshr-org-7824 341 2 , , , blog-dshr-org-7824 341 3 the the DT blog-dshr-org-7824 341 4 scheme scheme NN blog-dshr-org-7824 341 5 interpreter interpreter NN blog-dshr-org-7824 341 6 , , , blog-dshr-org-7824 341 7 is be VBZ blog-dshr-org-7824 341 8 written write VBN blog-dshr-org-7824 341 9 in in IN blog-dshr-org-7824 341 10 about about RB blog-dshr-org-7824 341 11 5,000 5,000 CD blog-dshr-org-7824 341 12 lines line NNS blog-dshr-org-7824 341 13 of of IN blog-dshr-org-7824 341 14 code code NN blog-dshr-org-7824 341 15 of of IN blog-dshr-org-7824 341 16 simple simple JJ blog-dshr-org-7824 341 17 C. C. NNP blog-dshr-org-7824 341 18 MesCC MesCC NNP blog-dshr-org-7824 341 19 , , , blog-dshr-org-7824 341 20 the the DT blog-dshr-org-7824 341 21 C C NNP blog-dshr-org-7824 341 22 compiler compiler NN blog-dshr-org-7824 341 23 , , , blog-dshr-org-7824 341 24 is be VBZ blog-dshr-org-7824 341 25 written write VBN blog-dshr-org-7824 341 26 in in IN blog-dshr-org-7824 341 27 scheme scheme NN blog-dshr-org-7824 341 28 . . . blog-dshr-org-7824 342 1 Together together RB blog-dshr-org-7824 342 2 , , , blog-dshr-org-7824 342 3 Mes Mes NNP blog-dshr-org-7824 342 4 and and CC blog-dshr-org-7824 342 5 MesCC MesCC NNP blog-dshr-org-7824 342 6 can can MD blog-dshr-org-7824 342 7 compile compile VB blog-dshr-org-7824 342 8 a a DT blog-dshr-org-7824 342 9 lightly lightly RB blog-dshr-org-7824 342 10 patched patch VBN blog-dshr-org-7824 342 11 TinyCC TinyCC NNP blog-dshr-org-7824 342 12 that that WDT blog-dshr-org-7824 342 13 is be VBZ blog-dshr-org-7824 342 14 self self NN blog-dshr-org-7824 342 15 - - HYPH blog-dshr-org-7824 342 16 hosting hosting NN blog-dshr-org-7824 342 17 . . . blog-dshr-org-7824 343 1 Using use VBG blog-dshr-org-7824 343 2 this this DT blog-dshr-org-7824 343 3 TinyCC TinyCC NNP blog-dshr-org-7824 343 4 and and CC blog-dshr-org-7824 343 5 the the DT blog-dshr-org-7824 343 6 Mes Mes NNP blog-dshr-org-7824 343 7 C C NNP blog-dshr-org-7824 343 8 library library NN blog-dshr-org-7824 343 9 , , , blog-dshr-org-7824 343 10 it -PRON- PRP blog-dshr-org-7824 343 11 is be VBZ blog-dshr-org-7824 343 12 possible possible JJ blog-dshr-org-7824 343 13 to to TO blog-dshr-org-7824 343 14 bootstrap bootstrap VB blog-dshr-org-7824 343 15 the the DT blog-dshr-org-7824 343 16 entire entire JJ blog-dshr-org-7824 343 17 Guix Guix NNP blog-dshr-org-7824 343 18 System System NNP blog-dshr-org-7824 343 19 for for IN blog-dshr-org-7824 343 20 i686-linux i686-linux NNP blog-dshr-org-7824 343 21 and and CC blog-dshr-org-7824 343 22 x86_64-linux x86_64-linux NNP blog-dshr-org-7824 343 23 . . . blog-dshr-org-7824 343 24 " " '' blog-dshr-org-7824 344 1 The the DT blog-dshr-org-7824 344 2 binary binary NN blog-dshr-org-7824 344 3 they -PRON- PRP blog-dshr-org-7824 344 4 plan plan VBP blog-dshr-org-7824 344 5 to to TO blog-dshr-org-7824 344 6 start start VB blog-dshr-org-7824 344 7 from from IN blog-dshr-org-7824 344 8 is be VBZ blog-dshr-org-7824 344 9 : : : blog-dshr-org-7824 344 10 " " `` blog-dshr-org-7824 344 11 Our -PRON- PRP$ blog-dshr-org-7824 344 12 next next JJ blog-dshr-org-7824 344 13 target target NN blog-dshr-org-7824 344 14 will will MD blog-dshr-org-7824 344 15 be be VB blog-dshr-org-7824 344 16 a a DT blog-dshr-org-7824 344 17 third third JJ blog-dshr-org-7824 344 18 reduction reduction NN blog-dshr-org-7824 344 19 by by IN blog-dshr-org-7824 344 20 ~50 ~50 NNP blog-dshr-org-7824 344 21 % % NN blog-dshr-org-7824 344 22 ; ; , blog-dshr-org-7824 344 23 the the DT blog-dshr-org-7824 344 24 Full Full NNP blog-dshr-org-7824 344 25 - - HYPH blog-dshr-org-7824 344 26 Source source NN blog-dshr-org-7824 344 27 bootstrap bootstrap NN blog-dshr-org-7824 344 28 will will MD blog-dshr-org-7824 344 29 replace replace VB blog-dshr-org-7824 344 30 the the DT blog-dshr-org-7824 344 31 MesCC MesCC NNP blog-dshr-org-7824 344 32 - - HYPH blog-dshr-org-7824 344 33 Tools Tools NNPS blog-dshr-org-7824 344 34 and and CC blog-dshr-org-7824 344 35 GNU GNU NNP blog-dshr-org-7824 344 36 Mes Mes NNP blog-dshr-org-7824 344 37 binaries binary NNS blog-dshr-org-7824 344 38 by by IN blog-dshr-org-7824 344 39 Stage0 Stage0 NNP blog-dshr-org-7824 344 40 and and CC blog-dshr-org-7824 344 41 M2-Planet M2-Planet NNP blog-dshr-org-7824 344 42 . . . blog-dshr-org-7824 345 1 The the DT blog-dshr-org-7824 345 2 Stage0 Stage0 NNP blog-dshr-org-7824 345 3 project project NN blog-dshr-org-7824 345 4 by by IN blog-dshr-org-7824 345 5 Jeremiah Jeremiah NNP blog-dshr-org-7824 345 6 Orians Orians NNP blog-dshr-org-7824 345 7 starts start VBZ blog-dshr-org-7824 345 8 everything everything NN blog-dshr-org-7824 345 9 from from IN blog-dshr-org-7824 345 10 ~512 ~512 NNP blog-dshr-org-7824 345 11 bytes byte NNS blog-dshr-org-7824 345 12 ; ; : blog-dshr-org-7824 345 13 virtually virtually RB blog-dshr-org-7824 345 14 nothing nothing NN blog-dshr-org-7824 345 15 . . . blog-dshr-org-7824 346 1 Have have VB blog-dshr-org-7824 346 2 a a DT blog-dshr-org-7824 346 3 look look NN blog-dshr-org-7824 346 4 at at IN blog-dshr-org-7824 346 5 this this DT blog-dshr-org-7824 346 6 incredible incredible JJ blog-dshr-org-7824 346 7 project project NN blog-dshr-org-7824 346 8 if if IN blog-dshr-org-7824 346 9 you -PRON- PRP blog-dshr-org-7824 346 10 have have VBP blog-dshr-org-7824 346 11 n’t not RB blog-dshr-org-7824 346 12 already already RB blog-dshr-org-7824 346 13 done do VBN blog-dshr-org-7824 346 14 so so RB blog-dshr-org-7824 346 15 . . . blog-dshr-org-7824 346 16 " " '' blog-dshr-org-7824 347 1 In in IN blog-dshr-org-7824 347 2 mid mid JJ blog-dshr-org-7824 347 3 November November NNP blog-dshr-org-7824 347 4 Nieuwenhuizen Nieuwenhuizen NNP blog-dshr-org-7824 347 5 tweeted tweet VBD blog-dshr-org-7824 347 6 : : : blog-dshr-org-7824 347 7 " " `` blog-dshr-org-7824 347 8 We -PRON- PRP blog-dshr-org-7824 347 9 just just RB blog-dshr-org-7824 347 10 compiled compile VBD blog-dshr-org-7824 347 11 the the DT blog-dshr-org-7824 347 12 first first JJ blog-dshr-org-7824 347 13 working working NN blog-dshr-org-7824 347 14 program program NN blog-dshr-org-7824 347 15 using use VBG blog-dshr-org-7824 347 16 a a DT blog-dshr-org-7824 347 17 Reduced Reduced NNP blog-dshr-org-7824 347 18 Binary Binary NNP blog-dshr-org-7824 347 19 Seed Seed NNP blog-dshr-org-7824 347 20 bootstrap'ped bootstrap'pe VBN blog-dshr-org-7824 347 21 * * NFP blog-dshr-org-7824 347 22 ) ) -RRB- blog-dshr-org-7824 347 23 TinyCC tinycc NN blog-dshr-org-7824 347 24 for for IN blog-dshr-org-7824 347 25 ARM arm NN blog-dshr-org-7824 347 26 " " '' blog-dshr-org-7824 347 27 And and CC blog-dshr-org-7824 347 28 on on IN blog-dshr-org-7824 347 29 December December NNP blog-dshr-org-7824 347 30 21 21 CD blog-dshr-org-7824 347 31 he -PRON- PRP blog-dshr-org-7824 347 32 tweeted tweet VBD blog-dshr-org-7824 347 33 : : : blog-dshr-org-7824 347 34 " " `` blog-dshr-org-7824 347 35 The the DT blog-dshr-org-7824 347 36 Reduced Reduced NNP blog-dshr-org-7824 347 37 Binary Binary NNP blog-dshr-org-7824 347 38 Seed Seed NNP blog-dshr-org-7824 347 39 bootstrap bootstrap NN blog-dshr-org-7824 347 40 is be VBZ blog-dshr-org-7824 347 41 coming come VBG blog-dshr-org-7824 347 42 to to IN blog-dshr-org-7824 347 43 ARM ARM NNP blog-dshr-org-7824 347 44 : : : blog-dshr-org-7824 347 45 Tiny tiny JJ blog-dshr-org-7824 347 46 C C NNP blog-dshr-org-7824 347 47 builds build VBZ blog-dshr-org-7824 347 48 on on IN blog-dshr-org-7824 347 49 @GuixHPC @GuixHPC NNP blog-dshr-org-7824 347 50 wip wip NN blog-dshr-org-7824 347 51 - - HYPH blog-dshr-org-7824 347 52 arm arm NN blog-dshr-org-7824 347 53 - - HYPH blog-dshr-org-7824 347 54 bootstrap bootstrap NN blog-dshr-org-7824 347 55 branch branch NN blog-dshr-org-7824 347 56 " " '' blog-dshr-org-7824 347 57 Starting start VBG blog-dshr-org-7824 347 58 from from IN blog-dshr-org-7824 347 59 a a DT blog-dshr-org-7824 347 60 working work VBG blog-dshr-org-7824 347 61 TinyCC TinyCC NNP blog-dshr-org-7824 347 62 , , , blog-dshr-org-7824 347 63 you -PRON- PRP blog-dshr-org-7824 347 64 can can MD blog-dshr-org-7824 347 65 build build VB blog-dshr-org-7824 347 66 the the DT blog-dshr-org-7824 347 67 current current JJ blog-dshr-org-7824 347 68 compiler compiler NN blog-dshr-org-7824 347 69 chain chain NN blog-dshr-org-7824 347 70 . . . blog-dshr-org-7824 348 1 December December NNP blog-dshr-org-7824 348 2 30 30 CD blog-dshr-org-7824 348 3 , , , blog-dshr-org-7824 348 4 2020 2020 CD blog-dshr-org-7824 348 5 at at IN blog-dshr-org-7824 348 6 3:26 3:26 CD blog-dshr-org-7824 348 7 PM pm NN blog-dshr-org-7824 348 8 Post Post NNP blog-dshr-org-7824 348 9 a a DT blog-dshr-org-7824 348 10 Comment Comment NNP blog-dshr-org-7824 348 11 Newer Newer NNP blog-dshr-org-7824 348 12 Post Post NNP blog-dshr-org-7824 348 13 Older Older NNP blog-dshr-org-7824 348 14 Post Post NNP blog-dshr-org-7824 348 15 Home Home NNP blog-dshr-org-7824 348 16 Subscribe Subscribe NNP blog-dshr-org-7824 348 17 to to TO blog-dshr-org-7824 348 18 : : : blog-dshr-org-7824 348 19 Post Post NNP blog-dshr-org-7824 348 20 Comments comment NNS blog-dshr-org-7824 348 21 ( ( -LRB- blog-dshr-org-7824 348 22 Atom atom NN blog-dshr-org-7824 348 23 ) ) -RRB- blog-dshr-org-7824 348 24 Blog Blog NNP blog-dshr-org-7824 348 25 Rules rule NNS blog-dshr-org-7824 348 26 Posts post NNS blog-dshr-org-7824 348 27 and and CC blog-dshr-org-7824 348 28 comments comment NNS blog-dshr-org-7824 348 29 are be VBP blog-dshr-org-7824 348 30 copyright copyright NN blog-dshr-org-7824 348 31 of of IN blog-dshr-org-7824 348 32 their -PRON- PRP$ blog-dshr-org-7824 348 33 respective respective JJ blog-dshr-org-7824 348 34 authors author NNS blog-dshr-org-7824 348 35 who who WP blog-dshr-org-7824 348 36 , , , blog-dshr-org-7824 348 37 by by IN blog-dshr-org-7824 348 38 posting post VBG blog-dshr-org-7824 348 39 or or CC blog-dshr-org-7824 348 40 commenting comment VBG blog-dshr-org-7824 348 41 , , , blog-dshr-org-7824 348 42 license license VBP blog-dshr-org-7824 348 43 their -PRON- PRP$ blog-dshr-org-7824 348 44 work work NN blog-dshr-org-7824 348 45 under under IN blog-dshr-org-7824 348 46 a a DT blog-dshr-org-7824 348 47 Creative Creative NNP blog-dshr-org-7824 348 48 Commons Commons NNP blog-dshr-org-7824 348 49 Attribution Attribution NNP blog-dshr-org-7824 348 50 - - HYPH blog-dshr-org-7824 348 51 Share Share NNP blog-dshr-org-7824 348 52 Alike alike RB blog-dshr-org-7824 348 53 3.0 3.0 CD blog-dshr-org-7824 348 54 United United NNP blog-dshr-org-7824 348 55 States States NNP blog-dshr-org-7824 348 56 License License NNP blog-dshr-org-7824 348 57 . . . blog-dshr-org-7824 349 1 Off off IN blog-dshr-org-7824 349 2 - - HYPH blog-dshr-org-7824 349 3 topic topic NN blog-dshr-org-7824 349 4 or or CC blog-dshr-org-7824 349 5 unsuitable unsuitable JJ blog-dshr-org-7824 349 6 comments comment NNS blog-dshr-org-7824 349 7 will will MD blog-dshr-org-7824 349 8 be be VB blog-dshr-org-7824 349 9 deleted delete VBN blog-dshr-org-7824 349 10 . . . blog-dshr-org-7824 350 1 DSHR DSHR NNP blog-dshr-org-7824 350 2 DSHR DSHR NNP blog-dshr-org-7824 350 3 in in IN blog-dshr-org-7824 350 4 ANWR ANWR NNP blog-dshr-org-7824 350 5 Recent recent JJ blog-dshr-org-7824 350 6 Comments comment NNS blog-dshr-org-7824 350 7 Full full JJ blog-dshr-org-7824 350 8 comments comment NNS blog-dshr-org-7824 350 9 Blog Blog NNP blog-dshr-org-7824 350 10 Archive Archive NNP blog-dshr-org-7824 350 11 ► ► NFP blog-dshr-org-7824 350 12     _SP blog-dshr-org-7824 350 13 2021 2021 CD blog-dshr-org-7824 350 14 ( ( -LRB- blog-dshr-org-7824 350 15 7 7 CD blog-dshr-org-7824 350 16 ) ) -RRB- blog-dshr-org-7824 350 17 ► ► NFP blog-dshr-org-7824 350 18     _SP blog-dshr-org-7824 350 19 February February NNP blog-dshr-org-7824 350 20 ( ( -LRB- blog-dshr-org-7824 350 21 2 2 CD blog-dshr-org-7824 350 22 ) ) -RRB- blog-dshr-org-7824 350 23 ► ► NFP blog-dshr-org-7824 350 24     _SP blog-dshr-org-7824 350 25 January January NNP blog-dshr-org-7824 350 26 ( ( -LRB- blog-dshr-org-7824 350 27 5 5 CD blog-dshr-org-7824 350 28 ) ) -RRB- blog-dshr-org-7824 350 29 ► ► CD blog-dshr-org-7824 350 30     _SP blog-dshr-org-7824 350 31 2020 2020 CD blog-dshr-org-7824 350 32 ( ( -LRB- blog-dshr-org-7824 350 33 55 55 CD blog-dshr-org-7824 350 34 ) ) -RRB- blog-dshr-org-7824 350 35 ► ► NFP blog-dshr-org-7824 350 36     _SP blog-dshr-org-7824 350 37 December December NNP blog-dshr-org-7824 350 38 ( ( -LRB- blog-dshr-org-7824 350 39 4 4 CD blog-dshr-org-7824 350 40 ) ) -RRB- blog-dshr-org-7824 350 41 ► ► NFP blog-dshr-org-7824 350 42     _SP blog-dshr-org-7824 350 43 November November NNP blog-dshr-org-7824 350 44 ( ( -LRB- blog-dshr-org-7824 350 45 4 4 CD blog-dshr-org-7824 350 46 ) ) -RRB- blog-dshr-org-7824 350 47 ► ► NFP blog-dshr-org-7824 350 48     _SP blog-dshr-org-7824 350 49 October October NNP blog-dshr-org-7824 350 50 ( ( -LRB- blog-dshr-org-7824 350 51 3 3 CD blog-dshr-org-7824 350 52 ) ) -RRB- blog-dshr-org-7824 350 53 ► ► NFP blog-dshr-org-7824 350 54     _SP blog-dshr-org-7824 350 55 September September NNP blog-dshr-org-7824 350 56 ( ( -LRB- blog-dshr-org-7824 350 57 6 6 CD blog-dshr-org-7824 350 58 ) ) -RRB- blog-dshr-org-7824 350 59 ► ► NFP blog-dshr-org-7824 350 60     _SP blog-dshr-org-7824 350 61 August August NNP blog-dshr-org-7824 350 62 ( ( -LRB- blog-dshr-org-7824 350 63 5 5 CD blog-dshr-org-7824 350 64 ) ) -RRB- blog-dshr-org-7824 350 65 ► ► NFP blog-dshr-org-7824 350 66     _SP blog-dshr-org-7824 350 67 July July NNP blog-dshr-org-7824 350 68 ( ( -LRB- blog-dshr-org-7824 350 69 3 3 CD blog-dshr-org-7824 350 70 ) ) -RRB- blog-dshr-org-7824 350 71 ► ► NFP blog-dshr-org-7824 350 72     _SP blog-dshr-org-7824 350 73 June June NNP blog-dshr-org-7824 350 74 ( ( -LRB- blog-dshr-org-7824 350 75 6 6 CD blog-dshr-org-7824 350 76 ) ) -RRB- blog-dshr-org-7824 350 77 ► ► NFP blog-dshr-org-7824 350 78     _SP blog-dshr-org-7824 350 79 May May NNP blog-dshr-org-7824 350 80 ( ( -LRB- blog-dshr-org-7824 350 81 3 3 CD blog-dshr-org-7824 350 82 ) ) -RRB- blog-dshr-org-7824 350 83 ► ► NFP blog-dshr-org-7824 350 84     _SP blog-dshr-org-7824 350 85 April April NNP blog-dshr-org-7824 350 86 ( ( -LRB- blog-dshr-org-7824 350 87 5 5 CD blog-dshr-org-7824 350 88 ) ) -RRB- blog-dshr-org-7824 350 89 ► ► NFP blog-dshr-org-7824 350 90     _SP blog-dshr-org-7824 350 91 March March NNP blog-dshr-org-7824 350 92 ( ( -LRB- blog-dshr-org-7824 350 93 6 6 CD blog-dshr-org-7824 350 94 ) ) -RRB- blog-dshr-org-7824 350 95 ► ► NFP blog-dshr-org-7824 350 96     _SP blog-dshr-org-7824 350 97 February February NNP blog-dshr-org-7824 350 98 ( ( -LRB- blog-dshr-org-7824 350 99 5 5 CD blog-dshr-org-7824 350 100 ) ) -RRB- blog-dshr-org-7824 350 101 ► ► NFP blog-dshr-org-7824 350 102     _SP blog-dshr-org-7824 350 103 January January NNP blog-dshr-org-7824 350 104 ( ( -LRB- blog-dshr-org-7824 350 105 5 5 CD blog-dshr-org-7824 350 106 ) ) -RRB- blog-dshr-org-7824 350 107 ► ► CD blog-dshr-org-7824 350 108     _SP blog-dshr-org-7824 350 109 2019 2019 CD blog-dshr-org-7824 350 110 ( ( -LRB- blog-dshr-org-7824 350 111 66 66 CD blog-dshr-org-7824 350 112 ) ) -RRB- blog-dshr-org-7824 350 113 ► ► NFP blog-dshr-org-7824 350 114     _SP blog-dshr-org-7824 350 115 December December NNP blog-dshr-org-7824 350 116 ( ( -LRB- blog-dshr-org-7824 350 117 2 2 CD blog-dshr-org-7824 350 118 ) ) -RRB- blog-dshr-org-7824 350 119 ► ► NFP blog-dshr-org-7824 350 120     _SP blog-dshr-org-7824 350 121 November November NNP blog-dshr-org-7824 350 122 ( ( -LRB- blog-dshr-org-7824 350 123 4 4 CD blog-dshr-org-7824 350 124 ) ) -RRB- blog-dshr-org-7824 350 125 ► ► NFP blog-dshr-org-7824 350 126     _SP blog-dshr-org-7824 350 127 October October NNP blog-dshr-org-7824 350 128 ( ( -LRB- blog-dshr-org-7824 350 129 8) 8) CD blog-dshr-org-7824 350 130 ► ► CD blog-dshr-org-7824 350 131     _SP blog-dshr-org-7824 350 132 September September NNP blog-dshr-org-7824 350 133 ( ( -LRB- blog-dshr-org-7824 350 134 5 5 CD blog-dshr-org-7824 350 135 ) ) -RRB- blog-dshr-org-7824 350 136 ► ► NFP blog-dshr-org-7824 350 137     _SP blog-dshr-org-7824 350 138 August August NNP blog-dshr-org-7824 350 139 ( ( -LRB- blog-dshr-org-7824 350 140 5 5 CD blog-dshr-org-7824 350 141 ) ) -RRB- blog-dshr-org-7824 350 142 ► ► NFP blog-dshr-org-7824 350 143     _SP blog-dshr-org-7824 350 144 July July NNP blog-dshr-org-7824 350 145 ( ( -LRB- blog-dshr-org-7824 350 146 7 7 CD blog-dshr-org-7824 350 147 ) ) -RRB- blog-dshr-org-7824 350 148 ► ► NFP blog-dshr-org-7824 350 149     _SP blog-dshr-org-7824 350 150 June June NNP blog-dshr-org-7824 350 151 ( ( -LRB- blog-dshr-org-7824 350 152 6 6 CD blog-dshr-org-7824 350 153 ) ) -RRB- blog-dshr-org-7824 350 154 ► ► NFP blog-dshr-org-7824 350 155     _SP blog-dshr-org-7824 350 156 May May NNP blog-dshr-org-7824 350 157 ( ( -LRB- blog-dshr-org-7824 350 158 7 7 CD blog-dshr-org-7824 350 159 ) ) -RRB- blog-dshr-org-7824 350 160 ► ► NFP blog-dshr-org-7824 350 161     _SP blog-dshr-org-7824 350 162 April April NNP blog-dshr-org-7824 350 163 ( ( -LRB- blog-dshr-org-7824 350 164 6 6 CD blog-dshr-org-7824 350 165 ) ) -RRB- blog-dshr-org-7824 350 166 ► ► NFP blog-dshr-org-7824 350 167     _SP blog-dshr-org-7824 350 168 March March NNP blog-dshr-org-7824 350 169 ( ( -LRB- blog-dshr-org-7824 350 170 7 7 CD blog-dshr-org-7824 350 171 ) ) -RRB- blog-dshr-org-7824 350 172 ► ► NFP blog-dshr-org-7824 350 173     _SP blog-dshr-org-7824 350 174 February February NNP blog-dshr-org-7824 350 175 ( ( -LRB- blog-dshr-org-7824 350 176 4 4 CD blog-dshr-org-7824 350 177 ) ) -RRB- blog-dshr-org-7824 350 178 ► ► NFP blog-dshr-org-7824 350 179     _SP blog-dshr-org-7824 350 180 January January NNP blog-dshr-org-7824 350 181 ( ( -LRB- blog-dshr-org-7824 350 182 5 5 CD blog-dshr-org-7824 350 183 ) ) -RRB- blog-dshr-org-7824 350 184 ▼ ▼ CD blog-dshr-org-7824 350 185     _SP blog-dshr-org-7824 350 186 2018 2018 CD blog-dshr-org-7824 350 187 ( ( -LRB- blog-dshr-org-7824 350 188 96 96 CD blog-dshr-org-7824 350 189 ) ) -RRB- blog-dshr-org-7824 350 190 ▼ ▼ CD blog-dshr-org-7824 350 191     _SP blog-dshr-org-7824 350 192 December December NNP blog-dshr-org-7824 350 193 ( ( -LRB- blog-dshr-org-7824 350 194 7 7 CD blog-dshr-org-7824 350 195 ) ) -RRB- blog-dshr-org-7824 350 196 Securing secure VBG blog-dshr-org-7824 350 197 The the DT blog-dshr-org-7824 350 198 Hardware Hardware NNP blog-dshr-org-7824 350 199 Supply Supply NNP blog-dshr-org-7824 350 200 Chain Chain NNP blog-dshr-org-7824 350 201 Meta Meta NNP blog-dshr-org-7824 350 202 : : : blog-dshr-org-7824 350 203 Impending impend VBG blog-dshr-org-7824 350 204 Blog blog NN blog-dshr-org-7824 350 205 Slowdown slowdown NN blog-dshr-org-7824 350 206 Securing secure VBG blog-dshr-org-7824 350 207 The the DT blog-dshr-org-7824 350 208 Software Software NNP blog-dshr-org-7824 350 209 Supply supply NN blog-dshr-org-7824 350 210 Chain Chain NNP blog-dshr-org-7824 350 211 Software Software NNP blog-dshr-org-7824 350 212 Preservation Preservation NNP blog-dshr-org-7824 350 213 Network Network NNP blog-dshr-org-7824 350 214 Blockchain Blockchain NNP blog-dshr-org-7824 350 215 : : : blog-dshr-org-7824 350 216 What what WP blog-dshr-org-7824 350 217 's be VBZ blog-dshr-org-7824 350 218 Not not RB blog-dshr-org-7824 350 219 To to TO blog-dshr-org-7824 350 220 Like like VB blog-dshr-org-7824 350 221 ? ? . blog-dshr-org-7824 351 1 Irina Irina NNP blog-dshr-org-7824 351 2 Bolychevsky Bolychevsky NNP blog-dshr-org-7824 351 3 on on IN blog-dshr-org-7824 351 4 Solid solid JJ blog-dshr-org-7824 351 5 Selective Selective NNP blog-dshr-org-7824 351 6 Amnesia Amnesia NNP blog-dshr-org-7824 351 7 ► ► NFP blog-dshr-org-7824 351 8     _SP blog-dshr-org-7824 351 9 November November NNP blog-dshr-org-7824 351 10 ( ( -LRB- blog-dshr-org-7824 351 11 8) 8) CD blog-dshr-org-7824 351 12 ► ► CD blog-dshr-org-7824 351 13     _SP blog-dshr-org-7824 351 14 October October NNP blog-dshr-org-7824 351 15 ( ( -LRB- blog-dshr-org-7824 351 16 10 10 CD blog-dshr-org-7824 351 17 ) ) -RRB- blog-dshr-org-7824 351 18 ► ► NFP blog-dshr-org-7824 351 19     _SP blog-dshr-org-7824 351 20 September September NNP blog-dshr-org-7824 351 21 ( ( -LRB- blog-dshr-org-7824 351 22 5 5 CD blog-dshr-org-7824 351 23 ) ) -RRB- blog-dshr-org-7824 351 24 ► ► NFP blog-dshr-org-7824 351 25     _SP blog-dshr-org-7824 351 26 August August NNP blog-dshr-org-7824 351 27 ( ( -LRB- blog-dshr-org-7824 351 28 8) 8) CD blog-dshr-org-7824 351 29 ► ► CD blog-dshr-org-7824 351 30     _SP blog-dshr-org-7824 351 31 July July NNP blog-dshr-org-7824 351 32 ( ( -LRB- blog-dshr-org-7824 351 33 5 5 CD blog-dshr-org-7824 351 34 ) ) -RRB- blog-dshr-org-7824 351 35 ► ► NFP blog-dshr-org-7824 351 36     _SP blog-dshr-org-7824 351 37 June June NNP blog-dshr-org-7824 351 38 ( ( -LRB- blog-dshr-org-7824 351 39 7 7 CD blog-dshr-org-7824 351 40 ) ) -RRB- blog-dshr-org-7824 351 41 ► ► NFP blog-dshr-org-7824 351 42     _SP blog-dshr-org-7824 351 43 May May NNP blog-dshr-org-7824 351 44 ( ( -LRB- blog-dshr-org-7824 351 45 10 10 CD blog-dshr-org-7824 351 46 ) ) -RRB- blog-dshr-org-7824 351 47 ► ► NFP blog-dshr-org-7824 351 48     _SP blog-dshr-org-7824 351 49 April April NNP blog-dshr-org-7824 351 50 ( ( -LRB- blog-dshr-org-7824 351 51 8) 8) CD blog-dshr-org-7824 351 52 ► ► CD blog-dshr-org-7824 351 53     _SP blog-dshr-org-7824 351 54 March March NNP blog-dshr-org-7824 351 55 ( ( -LRB- blog-dshr-org-7824 351 56 9 9 CD blog-dshr-org-7824 351 57 ) ) -RRB- blog-dshr-org-7824 351 58 ► ► NFP blog-dshr-org-7824 351 59     _SP blog-dshr-org-7824 351 60 February February NNP blog-dshr-org-7824 351 61 ( ( -LRB- blog-dshr-org-7824 351 62 9 9 CD blog-dshr-org-7824 351 63 ) ) -RRB- blog-dshr-org-7824 351 64 ► ► NFP blog-dshr-org-7824 351 65     _SP blog-dshr-org-7824 351 66 January January NNP blog-dshr-org-7824 351 67 ( ( -LRB- blog-dshr-org-7824 351 68 10 10 CD blog-dshr-org-7824 351 69 ) ) -RRB- blog-dshr-org-7824 351 70 ► ► NFP blog-dshr-org-7824 351 71     _SP blog-dshr-org-7824 351 72 2017 2017 CD blog-dshr-org-7824 351 73 ( ( -LRB- blog-dshr-org-7824 351 74 82 82 CD blog-dshr-org-7824 351 75 ) ) -RRB- blog-dshr-org-7824 351 76 ► ► NFP blog-dshr-org-7824 351 77     _SP blog-dshr-org-7824 351 78 December December NNP blog-dshr-org-7824 351 79 ( ( -LRB- blog-dshr-org-7824 351 80 6 6 CD blog-dshr-org-7824 351 81 ) ) -RRB- blog-dshr-org-7824 351 82 ► ► NFP blog-dshr-org-7824 351 83     _SP blog-dshr-org-7824 351 84 November November NNP blog-dshr-org-7824 351 85 ( ( -LRB- blog-dshr-org-7824 351 86 6 6 CD blog-dshr-org-7824 351 87 ) ) -RRB- blog-dshr-org-7824 351 88 ► ► NFP blog-dshr-org-7824 351 89     _SP blog-dshr-org-7824 351 90 October October NNP blog-dshr-org-7824 351 91 ( ( -LRB- blog-dshr-org-7824 351 92 8) 8) CD blog-dshr-org-7824 351 93 ► ► CD blog-dshr-org-7824 351 94     _SP blog-dshr-org-7824 351 95 September September NNP blog-dshr-org-7824 351 96 ( ( -LRB- blog-dshr-org-7824 351 97 6 6 CD blog-dshr-org-7824 351 98 ) ) -RRB- blog-dshr-org-7824 351 99 ► ► NFP blog-dshr-org-7824 351 100     _SP blog-dshr-org-7824 351 101 August August NNP blog-dshr-org-7824 351 102 ( ( -LRB- blog-dshr-org-7824 351 103 7 7 CD blog-dshr-org-7824 351 104 ) ) -RRB- blog-dshr-org-7824 351 105 ► ► NFP blog-dshr-org-7824 351 106     _SP blog-dshr-org-7824 351 107 July July NNP blog-dshr-org-7824 351 108 ( ( -LRB- blog-dshr-org-7824 351 109 5 5 CD blog-dshr-org-7824 351 110 ) ) -RRB- blog-dshr-org-7824 351 111 ► ► NFP blog-dshr-org-7824 351 112     _SP blog-dshr-org-7824 351 113 June June NNP blog-dshr-org-7824 351 114 ( ( -LRB- blog-dshr-org-7824 351 115 7 7 CD blog-dshr-org-7824 351 116 ) ) -RRB- blog-dshr-org-7824 351 117 ► ► NFP blog-dshr-org-7824 351 118     _SP blog-dshr-org-7824 351 119 May May NNP blog-dshr-org-7824 351 120 ( ( -LRB- blog-dshr-org-7824 351 121 6 6 CD blog-dshr-org-7824 351 122 ) ) -RRB- blog-dshr-org-7824 351 123 ► ► NFP blog-dshr-org-7824 351 124     _SP blog-dshr-org-7824 351 125 April April NNP blog-dshr-org-7824 351 126 ( ( -LRB- blog-dshr-org-7824 351 127 7 7 CD blog-dshr-org-7824 351 128 ) ) -RRB- blog-dshr-org-7824 351 129 ► ► NFP blog-dshr-org-7824 351 130     _SP blog-dshr-org-7824 351 131 March March NNP blog-dshr-org-7824 351 132 ( ( -LRB- blog-dshr-org-7824 351 133 11 11 CD blog-dshr-org-7824 351 134 ) ) -RRB- blog-dshr-org-7824 351 135 ► ► NFP blog-dshr-org-7824 351 136     _SP blog-dshr-org-7824 351 137 February February NNP blog-dshr-org-7824 351 138 ( ( -LRB- blog-dshr-org-7824 351 139 5 5 CD blog-dshr-org-7824 351 140 ) ) -RRB- blog-dshr-org-7824 351 141 ► ► NFP blog-dshr-org-7824 351 142     _SP blog-dshr-org-7824 351 143 January January NNP blog-dshr-org-7824 351 144 ( ( -LRB- blog-dshr-org-7824 351 145 8) 8) CD blog-dshr-org-7824 351 146 ► ► CD blog-dshr-org-7824 351 147     _SP blog-dshr-org-7824 351 148 2016 2016 CD blog-dshr-org-7824 351 149 ( ( -LRB- blog-dshr-org-7824 351 150 89 89 CD blog-dshr-org-7824 351 151 ) ) -RRB- blog-dshr-org-7824 351 152 ► ► NFP blog-dshr-org-7824 351 153     _SP blog-dshr-org-7824 351 154 December December NNP blog-dshr-org-7824 351 155 ( ( -LRB- blog-dshr-org-7824 351 156 4 4 CD blog-dshr-org-7824 351 157 ) ) -RRB- blog-dshr-org-7824 351 158 ► ► NFP blog-dshr-org-7824 351 159     _SP blog-dshr-org-7824 351 160 November November NNP blog-dshr-org-7824 351 161 ( ( -LRB- blog-dshr-org-7824 351 162 8) 8) CD blog-dshr-org-7824 351 163 ► ► CD blog-dshr-org-7824 351 164     _SP blog-dshr-org-7824 351 165 October October NNP blog-dshr-org-7824 351 166 ( ( -LRB- blog-dshr-org-7824 351 167 10 10 CD blog-dshr-org-7824 351 168 ) ) -RRB- blog-dshr-org-7824 351 169 ► ► NFP blog-dshr-org-7824 351 170     _SP blog-dshr-org-7824 351 171 September September NNP blog-dshr-org-7824 351 172 ( ( -LRB- blog-dshr-org-7824 351 173 8) 8) CD blog-dshr-org-7824 351 174 ► ► CD blog-dshr-org-7824 351 175     _SP blog-dshr-org-7824 351 176 August August NNP blog-dshr-org-7824 351 177 ( ( -LRB- blog-dshr-org-7824 351 178 8) 8) CD blog-dshr-org-7824 351 179 ► ► CD blog-dshr-org-7824 351 180     _SP blog-dshr-org-7824 351 181 July July NNP blog-dshr-org-7824 351 182 ( ( -LRB- blog-dshr-org-7824 351 183 7 7 CD blog-dshr-org-7824 351 184 ) ) -RRB- blog-dshr-org-7824 351 185 ► ► NFP blog-dshr-org-7824 351 186     _SP blog-dshr-org-7824 351 187 June June NNP blog-dshr-org-7824 351 188 ( ( -LRB- blog-dshr-org-7824 351 189 8) 8) CD blog-dshr-org-7824 351 190 ► ► CD blog-dshr-org-7824 351 191     _SP blog-dshr-org-7824 351 192 May May NNP blog-dshr-org-7824 351 193 ( ( -LRB- blog-dshr-org-7824 351 194 7 7 CD blog-dshr-org-7824 351 195 ) ) -RRB- blog-dshr-org-7824 351 196 ► ► NFP blog-dshr-org-7824 351 197     _SP blog-dshr-org-7824 351 198 April April NNP blog-dshr-org-7824 351 199 ( ( -LRB- blog-dshr-org-7824 351 200 5 5 CD blog-dshr-org-7824 351 201 ) ) -RRB- blog-dshr-org-7824 351 202 ► ► NFP blog-dshr-org-7824 351 203     _SP blog-dshr-org-7824 351 204 March March NNP blog-dshr-org-7824 351 205 ( ( -LRB- blog-dshr-org-7824 351 206 10 10 CD blog-dshr-org-7824 351 207 ) ) -RRB- blog-dshr-org-7824 351 208 ► ► NFP blog-dshr-org-7824 351 209     _SP blog-dshr-org-7824 351 210 February February NNP blog-dshr-org-7824 351 211 ( ( -LRB- blog-dshr-org-7824 351 212 7 7 CD blog-dshr-org-7824 351 213 ) ) -RRB- blog-dshr-org-7824 351 214 ► ► NFP blog-dshr-org-7824 351 215     _SP blog-dshr-org-7824 351 216 January January NNP blog-dshr-org-7824 351 217 ( ( -LRB- blog-dshr-org-7824 351 218 7 7 CD blog-dshr-org-7824 351 219 ) ) -RRB- blog-dshr-org-7824 351 220 ► ► NFP blog-dshr-org-7824 351 221     _SP blog-dshr-org-7824 351 222 2015 2015 CD blog-dshr-org-7824 351 223 ( ( -LRB- blog-dshr-org-7824 351 224 75 75 CD blog-dshr-org-7824 351 225 ) ) -RRB- blog-dshr-org-7824 351 226 ► ► NFP blog-dshr-org-7824 351 227     _SP blog-dshr-org-7824 351 228 December December NNP blog-dshr-org-7824 351 229 ( ( -LRB- blog-dshr-org-7824 351 230 7 7 CD blog-dshr-org-7824 351 231 ) ) -RRB- blog-dshr-org-7824 351 232 ► ► NFP blog-dshr-org-7824 351 233     _SP blog-dshr-org-7824 351 234 November November NNP blog-dshr-org-7824 351 235 ( ( -LRB- blog-dshr-org-7824 351 236 5 5 CD blog-dshr-org-7824 351 237 ) ) -RRB- blog-dshr-org-7824 351 238 ► ► NFP blog-dshr-org-7824 351 239     _SP blog-dshr-org-7824 351 240 October October NNP blog-dshr-org-7824 351 241 ( ( -LRB- blog-dshr-org-7824 351 242 11 11 CD blog-dshr-org-7824 351 243 ) ) -RRB- blog-dshr-org-7824 351 244 ► ► NFP blog-dshr-org-7824 351 245     _SP blog-dshr-org-7824 351 246 September September NNP blog-dshr-org-7824 351 247 ( ( -LRB- blog-dshr-org-7824 351 248 5 5 CD blog-dshr-org-7824 351 249 ) ) -RRB- blog-dshr-org-7824 351 250 ► ► NFP blog-dshr-org-7824 351 251     _SP blog-dshr-org-7824 351 252 August August NNP blog-dshr-org-7824 351 253 ( ( -LRB- blog-dshr-org-7824 351 254 3 3 CD blog-dshr-org-7824 351 255 ) ) -RRB- blog-dshr-org-7824 351 256 ► ► NFP blog-dshr-org-7824 351 257     _SP blog-dshr-org-7824 351 258 July July NNP blog-dshr-org-7824 351 259 ( ( -LRB- blog-dshr-org-7824 351 260 3 3 CD blog-dshr-org-7824 351 261 ) ) -RRB- blog-dshr-org-7824 351 262 ► ► NFP blog-dshr-org-7824 351 263     _SP blog-dshr-org-7824 351 264 June June NNP blog-dshr-org-7824 351 265 ( ( -LRB- blog-dshr-org-7824 351 266 8) 8) CD blog-dshr-org-7824 351 267 ► ► CD blog-dshr-org-7824 351 268     _SP blog-dshr-org-7824 351 269 May May NNP blog-dshr-org-7824 351 270 ( ( -LRB- blog-dshr-org-7824 351 271 10 10 CD blog-dshr-org-7824 351 272 ) ) -RRB- blog-dshr-org-7824 351 273 ► ► NFP blog-dshr-org-7824 351 274     _SP blog-dshr-org-7824 351 275 April April NNP blog-dshr-org-7824 351 276 ( ( -LRB- blog-dshr-org-7824 351 277 6 6 CD blog-dshr-org-7824 351 278 ) ) -RRB- blog-dshr-org-7824 351 279 ► ► NFP blog-dshr-org-7824 351 280     _SP blog-dshr-org-7824 351 281 March March NNP blog-dshr-org-7824 351 282 ( ( -LRB- blog-dshr-org-7824 351 283 6 6 CD blog-dshr-org-7824 351 284 ) ) -RRB- blog-dshr-org-7824 351 285 ► ► NFP blog-dshr-org-7824 351 286     _SP blog-dshr-org-7824 351 287 February February NNP blog-dshr-org-7824 351 288 ( ( -LRB- blog-dshr-org-7824 351 289 7 7 CD blog-dshr-org-7824 351 290 ) ) -RRB- blog-dshr-org-7824 351 291 ► ► NFP blog-dshr-org-7824 351 292     _SP blog-dshr-org-7824 351 293 January January NNP blog-dshr-org-7824 351 294 ( ( -LRB- blog-dshr-org-7824 351 295 4 4 CD blog-dshr-org-7824 351 296 ) ) -RRB- blog-dshr-org-7824 351 297 ► ► CD blog-dshr-org-7824 351 298     _SP blog-dshr-org-7824 351 299 2014 2014 CD blog-dshr-org-7824 351 300 ( ( -LRB- blog-dshr-org-7824 351 301 68 68 CD blog-dshr-org-7824 351 302 ) ) -RRB- blog-dshr-org-7824 351 303 ► ► NFP blog-dshr-org-7824 351 304     _SP blog-dshr-org-7824 351 305 December December NNP blog-dshr-org-7824 351 306 ( ( -LRB- blog-dshr-org-7824 351 307 7 7 CD blog-dshr-org-7824 351 308 ) ) -RRB- blog-dshr-org-7824 351 309 ► ► NFP blog-dshr-org-7824 351 310     _SP blog-dshr-org-7824 351 311 November November NNP blog-dshr-org-7824 351 312 ( ( -LRB- blog-dshr-org-7824 351 313 8) 8) CD blog-dshr-org-7824 351 314 ► ► CD blog-dshr-org-7824 351 315     _SP blog-dshr-org-7824 351 316 October October NNP blog-dshr-org-7824 351 317 ( ( -LRB- blog-dshr-org-7824 351 318 6 6 CD blog-dshr-org-7824 351 319 ) ) -RRB- blog-dshr-org-7824 351 320 ► ► NFP blog-dshr-org-7824 351 321     _SP blog-dshr-org-7824 351 322 September September NNP blog-dshr-org-7824 351 323 ( ( -LRB- blog-dshr-org-7824 351 324 8) 8) CD blog-dshr-org-7824 351 325 ► ► CD blog-dshr-org-7824 351 326     _SP blog-dshr-org-7824 351 327 August August NNP blog-dshr-org-7824 351 328 ( ( -LRB- blog-dshr-org-7824 351 329 7 7 CD blog-dshr-org-7824 351 330 ) ) -RRB- blog-dshr-org-7824 351 331 ► ► NFP blog-dshr-org-7824 351 332     _SP blog-dshr-org-7824 351 333 July July NNP blog-dshr-org-7824 351 334 ( ( -LRB- blog-dshr-org-7824 351 335 3 3 CD blog-dshr-org-7824 351 336 ) ) -RRB- blog-dshr-org-7824 351 337 ► ► NFP blog-dshr-org-7824 351 338     _SP blog-dshr-org-7824 351 339 June June NNP blog-dshr-org-7824 351 340 ( ( -LRB- blog-dshr-org-7824 351 341 5 5 CD blog-dshr-org-7824 351 342 ) ) -RRB- blog-dshr-org-7824 351 343 ► ► NFP blog-dshr-org-7824 351 344     _SP blog-dshr-org-7824 351 345 May May NNP blog-dshr-org-7824 351 346 ( ( -LRB- blog-dshr-org-7824 351 347 6 6 CD blog-dshr-org-7824 351 348 ) ) -RRB- blog-dshr-org-7824 351 349 ► ► NFP blog-dshr-org-7824 351 350     _SP blog-dshr-org-7824 351 351 April April NNP blog-dshr-org-7824 351 352 ( ( -LRB- blog-dshr-org-7824 351 353 5 5 CD blog-dshr-org-7824 351 354 ) ) -RRB- blog-dshr-org-7824 351 355 ► ► NFP blog-dshr-org-7824 351 356     _SP blog-dshr-org-7824 351 357 March March NNP blog-dshr-org-7824 351 358 ( ( -LRB- blog-dshr-org-7824 351 359 6 6 CD blog-dshr-org-7824 351 360 ) ) -RRB- blog-dshr-org-7824 351 361 ► ► NFP blog-dshr-org-7824 351 362     _SP blog-dshr-org-7824 351 363 February February NNP blog-dshr-org-7824 351 364 ( ( -LRB- blog-dshr-org-7824 351 365 2 2 CD blog-dshr-org-7824 351 366 ) ) -RRB- blog-dshr-org-7824 351 367 ► ► NFP blog-dshr-org-7824 351 368     _SP blog-dshr-org-7824 351 369 January January NNP blog-dshr-org-7824 351 370 ( ( -LRB- blog-dshr-org-7824 351 371 5 5 CD blog-dshr-org-7824 351 372 ) ) -RRB- blog-dshr-org-7824 351 373 ► ► CD blog-dshr-org-7824 351 374     _SP blog-dshr-org-7824 351 375 2013 2013 CD blog-dshr-org-7824 351 376 ( ( -LRB- blog-dshr-org-7824 351 377 67 67 CD blog-dshr-org-7824 351 378 ) ) -RRB- blog-dshr-org-7824 351 379 ► ► NFP blog-dshr-org-7824 351 380     _SP blog-dshr-org-7824 351 381 December December NNP blog-dshr-org-7824 351 382 ( ( -LRB- blog-dshr-org-7824 351 383 3 3 CD blog-dshr-org-7824 351 384 ) ) -RRB- blog-dshr-org-7824 351 385 ► ► NFP blog-dshr-org-7824 351 386     _SP blog-dshr-org-7824 351 387 November November NNP blog-dshr-org-7824 351 388 ( ( -LRB- blog-dshr-org-7824 351 389 6 6 CD blog-dshr-org-7824 351 390 ) ) -RRB- blog-dshr-org-7824 351 391 ► ► NFP blog-dshr-org-7824 351 392     _SP blog-dshr-org-7824 351 393 October October NNP blog-dshr-org-7824 351 394 ( ( -LRB- blog-dshr-org-7824 351 395 7 7 CD blog-dshr-org-7824 351 396 ) ) -RRB- blog-dshr-org-7824 351 397 ► ► NFP blog-dshr-org-7824 351 398     _SP blog-dshr-org-7824 351 399 September September NNP blog-dshr-org-7824 351 400 ( ( -LRB- blog-dshr-org-7824 351 401 6 6 CD blog-dshr-org-7824 351 402 ) ) -RRB- blog-dshr-org-7824 351 403 ► ► NFP blog-dshr-org-7824 351 404     _SP blog-dshr-org-7824 351 405 August August NNP blog-dshr-org-7824 351 406 ( ( -LRB- blog-dshr-org-7824 351 407 3 3 CD blog-dshr-org-7824 351 408 ) ) -RRB- blog-dshr-org-7824 351 409 ► ► NFP blog-dshr-org-7824 351 410     _SP blog-dshr-org-7824 351 411 July July NNP blog-dshr-org-7824 351 412 ( ( -LRB- blog-dshr-org-7824 351 413 5 5 CD blog-dshr-org-7824 351 414 ) ) -RRB- blog-dshr-org-7824 351 415 ► ► NFP blog-dshr-org-7824 351 416     _SP blog-dshr-org-7824 351 417 June June NNP blog-dshr-org-7824 351 418 ( ( -LRB- blog-dshr-org-7824 351 419 6 6 CD blog-dshr-org-7824 351 420 ) ) -RRB- blog-dshr-org-7824 351 421 ► ► NFP blog-dshr-org-7824 351 422     _SP blog-dshr-org-7824 351 423 May May NNP blog-dshr-org-7824 351 424 ( ( -LRB- blog-dshr-org-7824 351 425 5 5 CD blog-dshr-org-7824 351 426 ) ) -RRB- blog-dshr-org-7824 351 427 ► ► NFP blog-dshr-org-7824 351 428     _SP blog-dshr-org-7824 351 429 April April NNP blog-dshr-org-7824 351 430 ( ( -LRB- blog-dshr-org-7824 351 431 9 9 CD blog-dshr-org-7824 351 432 ) ) -RRB- blog-dshr-org-7824 351 433 ► ► NFP blog-dshr-org-7824 351 434     _SP blog-dshr-org-7824 351 435 March March NNP blog-dshr-org-7824 351 436 ( ( -LRB- blog-dshr-org-7824 351 437 5 5 CD blog-dshr-org-7824 351 438 ) ) -RRB- blog-dshr-org-7824 351 439 ► ► NFP blog-dshr-org-7824 351 440     _SP blog-dshr-org-7824 351 441 February February NNP blog-dshr-org-7824 351 442 ( ( -LRB- blog-dshr-org-7824 351 443 5 5 CD blog-dshr-org-7824 351 444 ) ) -RRB- blog-dshr-org-7824 351 445 ► ► NFP blog-dshr-org-7824 351 446     _SP blog-dshr-org-7824 351 447 January January NNP blog-dshr-org-7824 351 448 ( ( -LRB- blog-dshr-org-7824 351 449 7 7 CD blog-dshr-org-7824 351 450 ) ) -RRB- blog-dshr-org-7824 351 451 ► ► CD blog-dshr-org-7824 351 452     _SP blog-dshr-org-7824 351 453 2012 2012 CD blog-dshr-org-7824 351 454 ( ( -LRB- blog-dshr-org-7824 351 455 43 43 CD blog-dshr-org-7824 351 456 ) ) -RRB- blog-dshr-org-7824 351 457 ► ► NFP blog-dshr-org-7824 351 458     _SP blog-dshr-org-7824 351 459 December December NNP blog-dshr-org-7824 351 460 ( ( -LRB- blog-dshr-org-7824 351 461 4 4 CD blog-dshr-org-7824 351 462 ) ) -RRB- blog-dshr-org-7824 351 463 ► ► NFP blog-dshr-org-7824 351 464     _SP blog-dshr-org-7824 351 465 November November NNP blog-dshr-org-7824 351 466 ( ( -LRB- blog-dshr-org-7824 351 467 4 4 CD blog-dshr-org-7824 351 468 ) ) -RRB- blog-dshr-org-7824 351 469 ► ► NFP blog-dshr-org-7824 351 470     _SP blog-dshr-org-7824 351 471 October October NNP blog-dshr-org-7824 351 472 ( ( -LRB- blog-dshr-org-7824 351 473 6 6 CD blog-dshr-org-7824 351 474 ) ) -RRB- blog-dshr-org-7824 351 475 ► ► NFP blog-dshr-org-7824 351 476     _SP blog-dshr-org-7824 351 477 September September NNP blog-dshr-org-7824 351 478 ( ( -LRB- blog-dshr-org-7824 351 479 6 6 CD blog-dshr-org-7824 351 480 ) ) -RRB- blog-dshr-org-7824 351 481 ► ► NFP blog-dshr-org-7824 351 482     _SP blog-dshr-org-7824 351 483 August August NNP blog-dshr-org-7824 351 484 ( ( -LRB- blog-dshr-org-7824 351 485 2 2 CD blog-dshr-org-7824 351 486 ) ) -RRB- blog-dshr-org-7824 351 487 ► ► NFP blog-dshr-org-7824 351 488     _SP blog-dshr-org-7824 351 489 July July NNP blog-dshr-org-7824 351 490 ( ( -LRB- blog-dshr-org-7824 351 491 5 5 CD blog-dshr-org-7824 351 492 ) ) -RRB- blog-dshr-org-7824 351 493 ► ► NFP blog-dshr-org-7824 351 494     _SP blog-dshr-org-7824 351 495 June June NNP blog-dshr-org-7824 351 496 ( ( -LRB- blog-dshr-org-7824 351 497 2 2 CD blog-dshr-org-7824 351 498 ) ) -RRB- blog-dshr-org-7824 351 499 ► ► NFP blog-dshr-org-7824 351 500     _SP blog-dshr-org-7824 351 501 May May NNP blog-dshr-org-7824 351 502 ( ( -LRB- blog-dshr-org-7824 351 503 5 5 CD blog-dshr-org-7824 351 504 ) ) -RRB- blog-dshr-org-7824 351 505 ► ► NFP blog-dshr-org-7824 351 506     _SP blog-dshr-org-7824 351 507 March March NNP blog-dshr-org-7824 351 508 ( ( -LRB- blog-dshr-org-7824 351 509 1 1 CD blog-dshr-org-7824 351 510 ) ) -RRB- blog-dshr-org-7824 351 511 ► ► NFP blog-dshr-org-7824 351 512     _SP blog-dshr-org-7824 351 513 February February NNP blog-dshr-org-7824 351 514 ( ( -LRB- blog-dshr-org-7824 351 515 5 5 CD blog-dshr-org-7824 351 516 ) ) -RRB- blog-dshr-org-7824 351 517 ► ► NFP blog-dshr-org-7824 351 518     _SP blog-dshr-org-7824 351 519 January January NNP blog-dshr-org-7824 351 520 ( ( -LRB- blog-dshr-org-7824 351 521 3 3 CD blog-dshr-org-7824 351 522 ) ) -RRB- blog-dshr-org-7824 351 523 ► ► CD blog-dshr-org-7824 351 524     _SP blog-dshr-org-7824 351 525 2011 2011 CD blog-dshr-org-7824 351 526 ( ( -LRB- blog-dshr-org-7824 351 527 40 40 CD blog-dshr-org-7824 351 528 ) ) -RRB- blog-dshr-org-7824 351 529 ► ► NFP blog-dshr-org-7824 351 530     _SP blog-dshr-org-7824 351 531 December December NNP blog-dshr-org-7824 351 532 ( ( -LRB- blog-dshr-org-7824 351 533 2 2 CD blog-dshr-org-7824 351 534 ) ) -RRB- blog-dshr-org-7824 351 535 ► ► NFP blog-dshr-org-7824 351 536     _SP blog-dshr-org-7824 351 537 November November NNP blog-dshr-org-7824 351 538 ( ( -LRB- blog-dshr-org-7824 351 539 1 1 CD blog-dshr-org-7824 351 540 ) ) -RRB- blog-dshr-org-7824 351 541 ► ► NFP blog-dshr-org-7824 351 542     _SP blog-dshr-org-7824 351 543 October October NNP blog-dshr-org-7824 351 544 ( ( -LRB- blog-dshr-org-7824 351 545 7 7 CD blog-dshr-org-7824 351 546 ) ) -RRB- blog-dshr-org-7824 351 547 ► ► NFP blog-dshr-org-7824 351 548     _SP blog-dshr-org-7824 351 549 September September NNP blog-dshr-org-7824 351 550 ( ( -LRB- blog-dshr-org-7824 351 551 3 3 CD blog-dshr-org-7824 351 552 ) ) -RRB- blog-dshr-org-7824 351 553 ► ► NFP blog-dshr-org-7824 351 554     _SP blog-dshr-org-7824 351 555 August August NNP blog-dshr-org-7824 351 556 ( ( -LRB- blog-dshr-org-7824 351 557 5 5 CD blog-dshr-org-7824 351 558 ) ) -RRB- blog-dshr-org-7824 351 559 ► ► NFP blog-dshr-org-7824 351 560     _SP blog-dshr-org-7824 351 561 July July NNP blog-dshr-org-7824 351 562 ( ( -LRB- blog-dshr-org-7824 351 563 2 2 CD blog-dshr-org-7824 351 564 ) ) -RRB- blog-dshr-org-7824 351 565 ► ► NFP blog-dshr-org-7824 351 566     _SP blog-dshr-org-7824 351 567 June June NNP blog-dshr-org-7824 351 568 ( ( -LRB- blog-dshr-org-7824 351 569 2 2 CD blog-dshr-org-7824 351 570 ) ) -RRB- blog-dshr-org-7824 351 571 ► ► NFP blog-dshr-org-7824 351 572     _SP blog-dshr-org-7824 351 573 May May NNP blog-dshr-org-7824 351 574 ( ( -LRB- blog-dshr-org-7824 351 575 2 2 CD blog-dshr-org-7824 351 576 ) ) -RRB- blog-dshr-org-7824 351 577 ► ► NFP blog-dshr-org-7824 351 578     _SP blog-dshr-org-7824 351 579 April April NNP blog-dshr-org-7824 351 580 ( ( -LRB- blog-dshr-org-7824 351 581 4 4 CD blog-dshr-org-7824 351 582 ) ) -RRB- blog-dshr-org-7824 351 583 ► ► NFP blog-dshr-org-7824 351 584     _SP blog-dshr-org-7824 351 585 March March NNP blog-dshr-org-7824 351 586 ( ( -LRB- blog-dshr-org-7824 351 587 4 4 CD blog-dshr-org-7824 351 588 ) ) -RRB- blog-dshr-org-7824 351 589 ► ► NFP blog-dshr-org-7824 351 590     _SP blog-dshr-org-7824 351 591 February February NNP blog-dshr-org-7824 351 592 ( ( -LRB- blog-dshr-org-7824 351 593 4 4 CD blog-dshr-org-7824 351 594 ) ) -RRB- blog-dshr-org-7824 351 595 ► ► NFP blog-dshr-org-7824 351 596     _SP blog-dshr-org-7824 351 597 January January NNP blog-dshr-org-7824 351 598 ( ( -LRB- blog-dshr-org-7824 351 599 4 4 CD blog-dshr-org-7824 351 600 ) ) -RRB- blog-dshr-org-7824 351 601 ► ► CD blog-dshr-org-7824 351 602     _SP blog-dshr-org-7824 351 603 2010 2010 CD blog-dshr-org-7824 351 604 ( ( -LRB- blog-dshr-org-7824 351 605 17 17 CD blog-dshr-org-7824 351 606 ) ) -RRB- blog-dshr-org-7824 351 607 ► ► NFP blog-dshr-org-7824 351 608     _SP blog-dshr-org-7824 351 609 December December NNP blog-dshr-org-7824 351 610 ( ( -LRB- blog-dshr-org-7824 351 611 5 5 CD blog-dshr-org-7824 351 612 ) ) -RRB- blog-dshr-org-7824 351 613 ► ► NFP blog-dshr-org-7824 351 614     _SP blog-dshr-org-7824 351 615 November November NNP blog-dshr-org-7824 351 616 ( ( -LRB- blog-dshr-org-7824 351 617 3 3 CD blog-dshr-org-7824 351 618 ) ) -RRB- blog-dshr-org-7824 351 619 ► ► NFP blog-dshr-org-7824 351 620     _SP blog-dshr-org-7824 351 621 October October NNP blog-dshr-org-7824 351 622 ( ( -LRB- blog-dshr-org-7824 351 623 4 4 CD blog-dshr-org-7824 351 624 ) ) -RRB- blog-dshr-org-7824 351 625 ► ► NFP blog-dshr-org-7824 351 626     _SP blog-dshr-org-7824 351 627 September September NNP blog-dshr-org-7824 351 628 ( ( -LRB- blog-dshr-org-7824 351 629 2 2 CD blog-dshr-org-7824 351 630 ) ) -RRB- blog-dshr-org-7824 351 631 ► ► NFP blog-dshr-org-7824 351 632     _SP blog-dshr-org-7824 351 633 July July NNP blog-dshr-org-7824 351 634 ( ( -LRB- blog-dshr-org-7824 351 635 1 1 CD blog-dshr-org-7824 351 636 ) ) -RRB- blog-dshr-org-7824 351 637 ► ► NFP blog-dshr-org-7824 351 638     _SP blog-dshr-org-7824 351 639 June June NNP blog-dshr-org-7824 351 640 ( ( -LRB- blog-dshr-org-7824 351 641 1 1 CD blog-dshr-org-7824 351 642 ) ) -RRB- blog-dshr-org-7824 351 643 ► ► NFP blog-dshr-org-7824 351 644     _SP blog-dshr-org-7824 351 645 February February NNP blog-dshr-org-7824 351 646 ( ( -LRB- blog-dshr-org-7824 351 647 1 1 CD blog-dshr-org-7824 351 648 ) ) -RRB- blog-dshr-org-7824 351 649 ► ► NFP blog-dshr-org-7824 351 650     _SP blog-dshr-org-7824 351 651 2009 2009 CD blog-dshr-org-7824 351 652 ( ( -LRB- blog-dshr-org-7824 351 653 8) 8) CD blog-dshr-org-7824 351 654 ► ► CD blog-dshr-org-7824 351 655     _SP blog-dshr-org-7824 351 656 July July NNP blog-dshr-org-7824 351 657 ( ( -LRB- blog-dshr-org-7824 351 658 1 1 CD blog-dshr-org-7824 351 659 ) ) -RRB- blog-dshr-org-7824 351 660 ► ► NFP blog-dshr-org-7824 351 661     _SP blog-dshr-org-7824 351 662 June June NNP blog-dshr-org-7824 351 663 ( ( -LRB- blog-dshr-org-7824 351 664 1 1 CD blog-dshr-org-7824 351 665 ) ) -RRB- blog-dshr-org-7824 351 666 ► ► NFP blog-dshr-org-7824 351 667     _SP blog-dshr-org-7824 351 668 May May NNP blog-dshr-org-7824 351 669 ( ( -LRB- blog-dshr-org-7824 351 670 1 1 CD blog-dshr-org-7824 351 671 ) ) -RRB- blog-dshr-org-7824 351 672 ► ► NFP blog-dshr-org-7824 351 673     _SP blog-dshr-org-7824 351 674 April April NNP blog-dshr-org-7824 351 675 ( ( -LRB- blog-dshr-org-7824 351 676 1 1 CD blog-dshr-org-7824 351 677 ) ) -RRB- blog-dshr-org-7824 351 678 ► ► NFP blog-dshr-org-7824 351 679     _SP blog-dshr-org-7824 351 680 March March NNP blog-dshr-org-7824 351 681 ( ( -LRB- blog-dshr-org-7824 351 682 2 2 CD blog-dshr-org-7824 351 683 ) ) -RRB- blog-dshr-org-7824 351 684 ► ► NFP blog-dshr-org-7824 351 685     _SP blog-dshr-org-7824 351 686 January January NNP blog-dshr-org-7824 351 687 ( ( -LRB- blog-dshr-org-7824 351 688 2 2 CD blog-dshr-org-7824 351 689 ) ) -RRB- blog-dshr-org-7824 351 690 ► ► NFP blog-dshr-org-7824 351 691     _SP blog-dshr-org-7824 351 692 2008 2008 CD blog-dshr-org-7824 351 693 ( ( -LRB- blog-dshr-org-7824 351 694 8) 8) CD blog-dshr-org-7824 351 695 ► ► CD blog-dshr-org-7824 351 696     _SP blog-dshr-org-7824 351 697 December December NNP blog-dshr-org-7824 351 698 ( ( -LRB- blog-dshr-org-7824 351 699 2 2 CD blog-dshr-org-7824 351 700 ) ) -RRB- blog-dshr-org-7824 351 701 ► ► NFP blog-dshr-org-7824 351 702     _SP blog-dshr-org-7824 351 703 March March NNP blog-dshr-org-7824 351 704 ( ( -LRB- blog-dshr-org-7824 351 705 1 1 CD blog-dshr-org-7824 351 706 ) ) -RRB- blog-dshr-org-7824 351 707 ► ► NFP blog-dshr-org-7824 351 708     _SP blog-dshr-org-7824 351 709 January January NNP blog-dshr-org-7824 351 710 ( ( -LRB- blog-dshr-org-7824 351 711 5 5 CD blog-dshr-org-7824 351 712 ) ) -RRB- blog-dshr-org-7824 351 713 ► ► CD blog-dshr-org-7824 351 714     _SP blog-dshr-org-7824 351 715 2007 2007 CD blog-dshr-org-7824 351 716 ( ( -LRB- blog-dshr-org-7824 351 717 14 14 CD blog-dshr-org-7824 351 718 ) ) -RRB- blog-dshr-org-7824 351 719 ► ► NFP blog-dshr-org-7824 351 720     _SP blog-dshr-org-7824 351 721 December December NNP blog-dshr-org-7824 351 722 ( ( -LRB- blog-dshr-org-7824 351 723 1 1 CD blog-dshr-org-7824 351 724 ) ) -RRB- blog-dshr-org-7824 351 725 ► ► NFP blog-dshr-org-7824 351 726     _SP blog-dshr-org-7824 351 727 October October NNP blog-dshr-org-7824 351 728 ( ( -LRB- blog-dshr-org-7824 351 729 3 3 CD blog-dshr-org-7824 351 730 ) ) -RRB- blog-dshr-org-7824 351 731 ► ► NFP blog-dshr-org-7824 351 732     _SP blog-dshr-org-7824 351 733 September September NNP blog-dshr-org-7824 351 734 ( ( -LRB- blog-dshr-org-7824 351 735 1 1 CD blog-dshr-org-7824 351 736 ) ) -RRB- blog-dshr-org-7824 351 737 ► ► NFP blog-dshr-org-7824 351 738     _SP blog-dshr-org-7824 351 739 August August NNP blog-dshr-org-7824 351 740 ( ( -LRB- blog-dshr-org-7824 351 741 1 1 CD blog-dshr-org-7824 351 742 ) ) -RRB- blog-dshr-org-7824 351 743 ► ► NFP blog-dshr-org-7824 351 744     _SP blog-dshr-org-7824 351 745 July July NNP blog-dshr-org-7824 351 746 ( ( -LRB- blog-dshr-org-7824 351 747 2 2 CD blog-dshr-org-7824 351 748 ) ) -RRB- blog-dshr-org-7824 351 749 ► ► NFP blog-dshr-org-7824 351 750     _SP blog-dshr-org-7824 351 751 June June NNP blog-dshr-org-7824 351 752 ( ( -LRB- blog-dshr-org-7824 351 753 3 3 CD blog-dshr-org-7824 351 754 ) ) -RRB- blog-dshr-org-7824 351 755 ► ► NFP blog-dshr-org-7824 351 756     _SP blog-dshr-org-7824 351 757 May May NNP blog-dshr-org-7824 351 758 ( ( -LRB- blog-dshr-org-7824 351 759 1 1 CD blog-dshr-org-7824 351 760 ) ) -RRB- blog-dshr-org-7824 351 761 ► ► NFP blog-dshr-org-7824 351 762     _SP blog-dshr-org-7824 351 763 April April NNP blog-dshr-org-7824 351 764 ( ( -LRB- blog-dshr-org-7824 351 765 2 2 LS blog-dshr-org-7824 351 766 ) ) -RRB- blog-dshr-org-7824 351 767 LOCKSS LOCKSS NNP blog-dshr-org-7824 351 768 system system NN blog-dshr-org-7824 351 769 has have VBZ blog-dshr-org-7824 351 770 permission permission NN blog-dshr-org-7824 351 771 to to TO blog-dshr-org-7824 351 772 collect collect VB blog-dshr-org-7824 351 773 , , , blog-dshr-org-7824 351 774 preserve preserve VB blog-dshr-org-7824 351 775 , , , blog-dshr-org-7824 351 776 and and CC blog-dshr-org-7824 351 777 serve serve VB blog-dshr-org-7824 351 778 this this DT blog-dshr-org-7824 351 779 Archival Archival NNP blog-dshr-org-7824 351 780 Unit Unit NNP blog-dshr-org-7824 351 781 . . . blog-dshr-org-7824 352 1 Simple simple JJ blog-dshr-org-7824 352 2 theme theme NN blog-dshr-org-7824 352 3 . . . blog-dshr-org-7824 353 1 Powered power VBN blog-dshr-org-7824 353 2 by by IN blog-dshr-org-7824 353 3 Blogger Blogger NNP blog-dshr-org-7824 353 4 . . .