id sid tid token lemma pos blog-dshr-org-8024 1 1 DSHR DSHR NNP blog-dshr-org-8024 1 2 's 's POS blog-dshr-org-8024 1 3 Blog blog NN blog-dshr-org-8024 1 4 : : : blog-dshr-org-8024 1 5 Talk talk VB blog-dshr-org-8024 1 6 At at IN blog-dshr-org-8024 1 7 Berkeley Berkeley NNP blog-dshr-org-8024 1 8 's 's POS blog-dshr-org-8024 1 9 Information Information NNP blog-dshr-org-8024 1 10 Access Access NNP blog-dshr-org-8024 1 11 Seminar Seminar NNP blog-dshr-org-8024 1 12 DSHR DSHR NNP blog-dshr-org-8024 1 13 's 's POS blog-dshr-org-8024 1 14 Blog Blog NNP blog-dshr-org-8024 1 15 I -PRON- PRP blog-dshr-org-8024 1 16 'm be VBP blog-dshr-org-8024 1 17 David David NNP blog-dshr-org-8024 1 18 Rosenthal Rosenthal NNP blog-dshr-org-8024 1 19 , , , blog-dshr-org-8024 1 20 and and CC blog-dshr-org-8024 1 21 this this DT blog-dshr-org-8024 1 22 is be VBZ blog-dshr-org-8024 1 23 a a DT blog-dshr-org-8024 1 24 place place NN blog-dshr-org-8024 1 25 to to TO blog-dshr-org-8024 1 26 discuss discuss VB blog-dshr-org-8024 1 27 the the DT blog-dshr-org-8024 1 28 work work NN blog-dshr-org-8024 1 29 I -PRON- PRP blog-dshr-org-8024 1 30 'm be VBP blog-dshr-org-8024 1 31 doing do VBG blog-dshr-org-8024 1 32 in in IN blog-dshr-org-8024 1 33 Digital Digital NNP blog-dshr-org-8024 1 34 Preservation Preservation NNP blog-dshr-org-8024 1 35 . . . blog-dshr-org-8024 2 1 Friday Friday NNP blog-dshr-org-8024 2 2 , , , blog-dshr-org-8024 2 3 February February NNP blog-dshr-org-8024 2 4 5 5 CD blog-dshr-org-8024 2 5 , , , blog-dshr-org-8024 2 6 2021 2021 CD blog-dshr-org-8024 2 7 Talk talk NN blog-dshr-org-8024 2 8 At at IN blog-dshr-org-8024 2 9 Berkeley Berkeley NNP blog-dshr-org-8024 2 10 's 's POS blog-dshr-org-8024 2 11 Information Information NNP blog-dshr-org-8024 2 12 Access Access NNP blog-dshr-org-8024 2 13 Seminar Seminar NNP blog-dshr-org-8024 2 14 Once once RB blog-dshr-org-8024 2 15 again again RB blog-dshr-org-8024 2 16 Cliff Cliff NNP blog-dshr-org-8024 2 17 Lynch Lynch NNP blog-dshr-org-8024 2 18 invited invite VBD blog-dshr-org-8024 2 19 me -PRON- PRP blog-dshr-org-8024 2 20 to to TO blog-dshr-org-8024 2 21 give give VB blog-dshr-org-8024 2 22 a a DT blog-dshr-org-8024 2 23 talk talk NN blog-dshr-org-8024 2 24 to to IN blog-dshr-org-8024 2 25 the the DT blog-dshr-org-8024 2 26 Information Information NNP blog-dshr-org-8024 2 27 Access Access NNP blog-dshr-org-8024 2 28 Seminar Seminar NNP blog-dshr-org-8024 2 29 at at IN blog-dshr-org-8024 2 30 UC UC NNP blog-dshr-org-8024 2 31 Berkeley Berkeley NNP blog-dshr-org-8024 2 32 's 's POS blog-dshr-org-8024 2 33 iSchool iSchool NNP blog-dshr-org-8024 2 34 . . . blog-dshr-org-8024 3 1 Preparation preparation NN blog-dshr-org-8024 3 2 time time NN blog-dshr-org-8024 3 3 was be VBD blog-dshr-org-8024 3 4 limited limited JJ blog-dshr-org-8024 3 5 because because IN blog-dshr-org-8024 3 6 these these DT blog-dshr-org-8024 3 7 days day NNS blog-dshr-org-8024 3 8 I -PRON- PRP blog-dshr-org-8024 3 9 'm be VBP blog-dshr-org-8024 3 10 a a DT blog-dshr-org-8024 3 11 full full JJ blog-dshr-org-8024 3 12 - - HYPH blog-dshr-org-8024 3 13 time time NN blog-dshr-org-8024 3 14 grandparent grandparent NN blog-dshr-org-8024 3 15 so so IN blog-dshr-org-8024 3 16 the the DT blog-dshr-org-8024 3 17 talk talk NN blog-dshr-org-8024 3 18 , , , blog-dshr-org-8024 3 19 entitled entitle VBN blog-dshr-org-8024 3 20 Securing secure VBG blog-dshr-org-8024 3 21 The the DT blog-dshr-org-8024 3 22 Digital Digital NNP blog-dshr-org-8024 3 23 Supply Supply NNP blog-dshr-org-8024 3 24 Chain Chain NNP blog-dshr-org-8024 3 25 summarizes summarize VBZ blog-dshr-org-8024 3 26 and and CC blog-dshr-org-8024 3 27 updates update VBZ blog-dshr-org-8024 3 28 two two CD blog-dshr-org-8024 3 29 long long JJ blog-dshr-org-8024 3 30 posts post NNS blog-dshr-org-8024 3 31 from from IN blog-dshr-org-8024 3 32 two two CD blog-dshr-org-8024 3 33 years year NNS blog-dshr-org-8024 3 34 ago ago RB blog-dshr-org-8024 3 35 : : : blog-dshr-org-8024 3 36 Certificate Certificate NNP blog-dshr-org-8024 3 37 Transparency transparency NN blog-dshr-org-8024 3 38 Securing Securing NNP blog-dshr-org-8024 3 39 The the DT blog-dshr-org-8024 3 40 Software Software NNP blog-dshr-org-8024 3 41 Supply supply NN blog-dshr-org-8024 3 42 Chain Chain NNP blog-dshr-org-8024 3 43 The the DT blog-dshr-org-8024 3 44 abstract abstract NN blog-dshr-org-8024 3 45 was be VBD blog-dshr-org-8024 3 46 : : : blog-dshr-org-8024 3 47 The the DT blog-dshr-org-8024 3 48 Internet internet NN blog-dshr-org-8024 3 49 is be VBZ blog-dshr-org-8024 3 50 suffering suffer VBG blog-dshr-org-8024 3 51 an an DT blog-dshr-org-8024 3 52 epidemic epidemic NN blog-dshr-org-8024 3 53 of of IN blog-dshr-org-8024 3 54 supply supply NN blog-dshr-org-8024 3 55 chain chain NN blog-dshr-org-8024 3 56 attacks attack NNS blog-dshr-org-8024 3 57 , , , blog-dshr-org-8024 3 58 in in IN blog-dshr-org-8024 3 59 which which WDT blog-dshr-org-8024 3 60 a a DT blog-dshr-org-8024 3 61 trusted trust VBN blog-dshr-org-8024 3 62 supplier supplier NN blog-dshr-org-8024 3 63 of of IN blog-dshr-org-8024 3 64 content content NN blog-dshr-org-8024 3 65 is be VBZ blog-dshr-org-8024 3 66 compromised compromise VBN blog-dshr-org-8024 3 67 and and CC blog-dshr-org-8024 3 68 delivers deliver VBZ blog-dshr-org-8024 3 69 malware malware NNP blog-dshr-org-8024 3 70 to to IN blog-dshr-org-8024 3 71 some some DT blog-dshr-org-8024 3 72 or or CC blog-dshr-org-8024 3 73 all all DT blog-dshr-org-8024 3 74 of of IN blog-dshr-org-8024 3 75 their -PRON- PRP$ blog-dshr-org-8024 3 76 clients client NNS blog-dshr-org-8024 3 77 . . . blog-dshr-org-8024 4 1 The the DT blog-dshr-org-8024 4 2 recent recent JJ blog-dshr-org-8024 4 3 SolarWinds SolarWinds NNP blog-dshr-org-8024 4 4 compromise compromise NN blog-dshr-org-8024 4 5 is be VBZ blog-dshr-org-8024 4 6 just just RB blog-dshr-org-8024 4 7 one one CD blog-dshr-org-8024 4 8 glaring glare VBG blog-dshr-org-8024 4 9 example example NN blog-dshr-org-8024 4 10 . . . blog-dshr-org-8024 5 1 This this DT blog-dshr-org-8024 5 2 talk talk NN blog-dshr-org-8024 5 3 reviews review VBZ blog-dshr-org-8024 5 4 efforts effort NNS blog-dshr-org-8024 5 5 to to TO blog-dshr-org-8024 5 6 defend defend VB blog-dshr-org-8024 5 7 digital digital JJ blog-dshr-org-8024 5 8 supply supply NN blog-dshr-org-8024 5 9 chains chain NNS blog-dshr-org-8024 5 10 . . . blog-dshr-org-8024 6 1 Below below IN blog-dshr-org-8024 6 2 the the DT blog-dshr-org-8024 6 3 fold fold NN blog-dshr-org-8024 6 4 , , , blog-dshr-org-8024 6 5 the the DT blog-dshr-org-8024 6 6 text text NN blog-dshr-org-8024 6 7 of of IN blog-dshr-org-8024 6 8 the the DT blog-dshr-org-8024 6 9 talk talk NN blog-dshr-org-8024 6 10 with with IN blog-dshr-org-8024 6 11 links link NNS blog-dshr-org-8024 6 12 to to IN blog-dshr-org-8024 6 13 the the DT blog-dshr-org-8024 6 14 sources source NNS blog-dshr-org-8024 6 15 . . . blog-dshr-org-8024 7 1 SolarWinds SolarWinds NNP blog-dshr-org-8024 7 2 , , , blog-dshr-org-8024 7 3 and and CC blog-dshr-org-8024 7 4 many many JJ blog-dshr-org-8024 7 5 other other JJ blog-dshr-org-8024 7 6 recent recent JJ blog-dshr-org-8024 7 7 system system NN blog-dshr-org-8024 7 8 and and CC blog-dshr-org-8024 7 9 network network NN blog-dshr-org-8024 7 10 compromises compromise NNS blog-dshr-org-8024 7 11 have have VBP blog-dshr-org-8024 7 12 been be VBN blog-dshr-org-8024 7 13 supply supply NN blog-dshr-org-8024 7 14 chain chain NN blog-dshr-org-8024 7 15 attacks attack NNS blog-dshr-org-8024 7 16 . . . blog-dshr-org-8024 8 1 These these DT blog-dshr-org-8024 8 2 are be VBP blog-dshr-org-8024 8 3 extremely extremely RB blog-dshr-org-8024 8 4 efficient efficient JJ blog-dshr-org-8024 8 5 , , , blog-dshr-org-8024 8 6 because because IN blog-dshr-org-8024 8 7 unlike unlike IN blog-dshr-org-8024 8 8 one one CD blog-dshr-org-8024 8 9 - - HYPH blog-dshr-org-8024 8 10 at at IN blog-dshr-org-8024 8 11 - - HYPH blog-dshr-org-8024 8 12 a a DT blog-dshr-org-8024 8 13 - - HYPH blog-dshr-org-8024 8 14 time time NN blog-dshr-org-8024 8 15 attacks attack NNS blog-dshr-org-8024 8 16 such such JJ blog-dshr-org-8024 8 17 as as IN blog-dshr-org-8024 8 18 phishing phishing NN blog-dshr-org-8024 8 19 , , , blog-dshr-org-8024 8 20 they -PRON- PRP blog-dshr-org-8024 8 21 provide provide VBP blog-dshr-org-8024 8 22 a a DT blog-dshr-org-8024 8 23 built build VBN blog-dshr-org-8024 8 24 - - HYPH blog-dshr-org-8024 8 25 in in RP blog-dshr-org-8024 8 26 mass mass JJ blog-dshr-org-8024 8 27 deployment deployment NN blog-dshr-org-8024 8 28 mechanism mechanism NN blog-dshr-org-8024 8 29 . . . blog-dshr-org-8024 9 1 A a DT blog-dshr-org-8024 9 2 single single JJ blog-dshr-org-8024 9 3 compromise compromise NN blog-dshr-org-8024 9 4 of of IN blog-dshr-org-8024 9 5 SolarWinds SolarWinds NNP blog-dshr-org-8024 9 6 infected infect VBN blog-dshr-org-8024 9 7 at at IN blog-dshr-org-8024 9 8 least least JJS blog-dshr-org-8024 9 9 18,000 18,000 CD blog-dshr-org-8024 9 10 networks network NNS blog-dshr-org-8024 9 11 . . . blog-dshr-org-8024 10 1 Clearly clearly RB blog-dshr-org-8024 10 2 , , , blog-dshr-org-8024 10 3 the the DT blog-dshr-org-8024 10 4 vendors vendor NNS blog-dshr-org-8024 10 5 ' ' POS blog-dshr-org-8024 10 6 security security NN blog-dshr-org-8024 10 7 practices practice NNS blog-dshr-org-8024 10 8 , , , blog-dshr-org-8024 10 9 and and CC blog-dshr-org-8024 10 10 their -PRON- PRP$ blog-dshr-org-8024 10 11 vendors vendor NNS blog-dshr-org-8024 10 12 ' ' POS blog-dshr-org-8024 10 13 security security NN blog-dshr-org-8024 10 14 practices practice NNS blog-dshr-org-8024 10 15 , , , blog-dshr-org-8024 10 16 and and CC blog-dshr-org-8024 10 17 so so RB blog-dshr-org-8024 10 18 on on IN blog-dshr-org-8024 10 19 ad ad NN blog-dshr-org-8024 10 20 infinitum infinitum IN blog-dshr-org-8024 10 21 are be VBP blog-dshr-org-8024 10 22 important important JJ blog-dshr-org-8024 10 23 , , , blog-dshr-org-8024 10 24 but but CC blog-dshr-org-8024 10 25 the the DT blog-dshr-org-8024 10 26 sad sad JJ blog-dshr-org-8024 10 27 truth truth NN blog-dshr-org-8024 10 28 is be VBZ blog-dshr-org-8024 10 29 that that IN blog-dshr-org-8024 10 30 current current JJ blog-dshr-org-8024 10 31 digital digital JJ blog-dshr-org-8024 10 32 supply supply NN blog-dshr-org-8024 10 33 chain chain NN blog-dshr-org-8024 10 34 technologies technology NNS blog-dshr-org-8024 10 35 are be VBP blog-dshr-org-8024 10 36 incapable incapable JJ blog-dshr-org-8024 10 37 of of IN blog-dshr-org-8024 10 38 mitigating mitigate VBG blog-dshr-org-8024 10 39 the the DT blog-dshr-org-8024 10 40 inevitable inevitable JJ blog-dshr-org-8024 10 41 security security NN blog-dshr-org-8024 10 42 lapses lapse NNS blog-dshr-org-8024 10 43 along along IN blog-dshr-org-8024 10 44 the the DT blog-dshr-org-8024 10 45 chain chain NN blog-dshr-org-8024 10 46 . . . blog-dshr-org-8024 11 1 This this DT blog-dshr-org-8024 11 2 talk talk NN blog-dshr-org-8024 11 3 reviews review VBZ blog-dshr-org-8024 11 4 the the DT blog-dshr-org-8024 11 5 efforts effort NNS blog-dshr-org-8024 11 6 to to TO blog-dshr-org-8024 11 7 defend defend VB blog-dshr-org-8024 11 8 supply supply NN blog-dshr-org-8024 11 9 chains chain NNS blog-dshr-org-8024 11 10 that that WDT blog-dshr-org-8024 11 11 deliver deliver VBP blog-dshr-org-8024 11 12 digital digital JJ blog-dshr-org-8024 11 13 content content NN blog-dshr-org-8024 11 14 , , , blog-dshr-org-8024 11 15 such such JJ blog-dshr-org-8024 11 16 as as IN blog-dshr-org-8024 11 17 software software NN blog-dshr-org-8024 11 18 . . . blog-dshr-org-8024 12 1 But but CC blog-dshr-org-8024 12 2 lets let NNS blog-dshr-org-8024 12 3 start start VBP blog-dshr-org-8024 12 4 with with IN blog-dshr-org-8024 12 5 a a DT blog-dshr-org-8024 12 6 simpler simple JJR blog-dshr-org-8024 12 7 case case NN blog-dshr-org-8024 12 8 , , , blog-dshr-org-8024 12 9 web web NN blog-dshr-org-8024 12 10 pages page NNS blog-dshr-org-8024 12 11 . . . blog-dshr-org-8024 13 1 Web web NN blog-dshr-org-8024 13 2 Page Page NNP blog-dshr-org-8024 13 3 Supply Supply NNP blog-dshr-org-8024 13 4 Chain chain NN blog-dshr-org-8024 13 5 How how WRB blog-dshr-org-8024 13 6 do do VBP blog-dshr-org-8024 13 7 I -PRON- PRP blog-dshr-org-8024 13 8 know know VB blog-dshr-org-8024 13 9 that that IN blog-dshr-org-8024 13 10 I -PRON- PRP blog-dshr-org-8024 13 11 'm be VBP blog-dshr-org-8024 13 12 talking talk VBG blog-dshr-org-8024 13 13 to to IN blog-dshr-org-8024 13 14 the the DT blog-dshr-org-8024 13 15 right right JJ blog-dshr-org-8024 13 16 Web web NN blog-dshr-org-8024 13 17 site site NN blog-dshr-org-8024 13 18 ? ? . blog-dshr-org-8024 14 1 Because because IN blog-dshr-org-8024 14 2 there there EX blog-dshr-org-8024 14 3 's be VBZ blog-dshr-org-8024 14 4 a a DT blog-dshr-org-8024 14 5 closed closed JJ blog-dshr-org-8024 14 6 padlock padlock NN blog-dshr-org-8024 14 7 icon icon NN blog-dshr-org-8024 14 8 in in IN blog-dshr-org-8024 14 9 the the DT blog-dshr-org-8024 14 10 URL URL NNP blog-dshr-org-8024 14 11 bar bar NN blog-dshr-org-8024 14 12 , , , blog-dshr-org-8024 14 13 right right JJ blog-dshr-org-8024 14 14 ? ? . blog-dshr-org-8024 15 1 [ [ -LRB- blog-dshr-org-8024 15 2 Slide slide NN blog-dshr-org-8024 15 3 1 1 CD blog-dshr-org-8024 15 4 ] ] -RRB- blog-dshr-org-8024 15 5 Mozilla Mozilla NNP blog-dshr-org-8024 15 6 says say VBZ blog-dshr-org-8024 15 7 : : : blog-dshr-org-8024 15 8 A a DT blog-dshr-org-8024 15 9 green green JJ blog-dshr-org-8024 15 10 padlock padlock NN blog-dshr-org-8024 15 11 ( ( -LRB- blog-dshr-org-8024 15 12 with with IN blog-dshr-org-8024 15 13 or or CC blog-dshr-org-8024 15 14 without without IN blog-dshr-org-8024 15 15 an an DT blog-dshr-org-8024 15 16 organization organization NN blog-dshr-org-8024 15 17 name name NN blog-dshr-org-8024 15 18 ) ) -RRB- blog-dshr-org-8024 15 19 indicates indicate VBZ blog-dshr-org-8024 15 20 that that DT blog-dshr-org-8024 15 21 : : : blog-dshr-org-8024 15 22 You -PRON- PRP blog-dshr-org-8024 15 23 are be VBP blog-dshr-org-8024 15 24 definitely definitely RB blog-dshr-org-8024 15 25 connected connected JJ blog-dshr-org-8024 15 26 to to IN blog-dshr-org-8024 15 27 the the DT blog-dshr-org-8024 15 28 website website NN blog-dshr-org-8024 15 29 whose whose WP$ blog-dshr-org-8024 15 30 address address NN blog-dshr-org-8024 15 31 is be VBZ blog-dshr-org-8024 15 32 shown show VBN blog-dshr-org-8024 15 33 in in IN blog-dshr-org-8024 15 34 the the DT blog-dshr-org-8024 15 35 address address NN blog-dshr-org-8024 15 36 bar bar NN blog-dshr-org-8024 15 37 ; ; : blog-dshr-org-8024 15 38 the the DT blog-dshr-org-8024 15 39 connection connection NN blog-dshr-org-8024 15 40 has have VBZ blog-dshr-org-8024 15 41 not not RB blog-dshr-org-8024 15 42 been be VBN blog-dshr-org-8024 15 43 intercepted intercept VBN blog-dshr-org-8024 15 44 . . . blog-dshr-org-8024 16 1 The the DT blog-dshr-org-8024 16 2 connection connection NN blog-dshr-org-8024 16 3 between between IN blog-dshr-org-8024 16 4 Firefox Firefox NNP blog-dshr-org-8024 16 5 and and CC blog-dshr-org-8024 16 6 the the DT blog-dshr-org-8024 16 7 website website NN blog-dshr-org-8024 16 8 is be VBZ blog-dshr-org-8024 16 9 encrypted encrypt VBN blog-dshr-org-8024 16 10 to to TO blog-dshr-org-8024 16 11 prevent prevent VB blog-dshr-org-8024 16 12 eavesdropping eavesdropping NN blog-dshr-org-8024 16 13 . . . blog-dshr-org-8024 17 1 NB NB NNP blog-dshr-org-8024 17 2 - - : blog-dshr-org-8024 17 3 this this DT blog-dshr-org-8024 17 4 is be VBZ blog-dshr-org-8024 17 5 misleading misleading JJ blog-dshr-org-8024 17 6 ! ! . blog-dshr-org-8024 18 1 The the DT blog-dshr-org-8024 18 2 padlock padlock NN blog-dshr-org-8024 18 3 icon icon NN blog-dshr-org-8024 18 4 appears appear VBZ blog-dshr-org-8024 18 5 when when WRB blog-dshr-org-8024 18 6 the the DT blog-dshr-org-8024 18 7 browser browser NN blog-dshr-org-8024 18 8 has have VBZ blog-dshr-org-8024 18 9 validated validate VBN blog-dshr-org-8024 18 10 that that IN blog-dshr-org-8024 18 11 the the DT blog-dshr-org-8024 18 12 connection connection NN blog-dshr-org-8024 18 13 to to IN blog-dshr-org-8024 18 14 the the DT blog-dshr-org-8024 18 15 URL url NN blog-dshr-org-8024 18 16 in in IN blog-dshr-org-8024 18 17 the the DT blog-dshr-org-8024 18 18 URL URL NNP blog-dshr-org-8024 18 19 bar bar NN blog-dshr-org-8024 18 20 supplied supply VBD blog-dshr-org-8024 18 21 a a DT blog-dshr-org-8024 18 22 certificate certificate NN blog-dshr-org-8024 18 23 for for IN blog-dshr-org-8024 18 24 the the DT blog-dshr-org-8024 18 25 site site NN blog-dshr-org-8024 18 26 in in IN blog-dshr-org-8024 18 27 question question NN blog-dshr-org-8024 18 28 carrying carry VBG blog-dshr-org-8024 18 29 a a DT blog-dshr-org-8024 18 30 signature signature NN blog-dshr-org-8024 18 31 chain chain NN blog-dshr-org-8024 18 32 ending end VBG blog-dshr-org-8024 18 33 in in IN blog-dshr-org-8024 18 34 one one CD blog-dshr-org-8024 18 35 of of IN blog-dshr-org-8024 18 36 the the DT blog-dshr-org-8024 18 37 root root NN blog-dshr-org-8024 18 38 certificates certificate VBZ blog-dshr-org-8024 18 39 the the DT blog-dshr-org-8024 18 40 browser browser NN blog-dshr-org-8024 18 41 trusts trust VBZ blog-dshr-org-8024 18 42 . . . blog-dshr-org-8024 19 1 Browsers browser NNS blog-dshr-org-8024 19 2 come come VBP blog-dshr-org-8024 19 3 with with IN blog-dshr-org-8024 19 4 a a DT blog-dshr-org-8024 19 5 default default NN blog-dshr-org-8024 19 6 list list NN blog-dshr-org-8024 19 7 of of IN blog-dshr-org-8024 19 8 root root NN blog-dshr-org-8024 19 9 certificates certificate NNS blog-dshr-org-8024 19 10 from from IN blog-dshr-org-8024 19 11 Certificate Certificate NNP blog-dshr-org-8024 19 12 Authorities Authorities NNPS blog-dshr-org-8024 19 13 ( ( -LRB- blog-dshr-org-8024 19 14 CAs CAs NNP blog-dshr-org-8024 19 15 ) ) -RRB- blog-dshr-org-8024 19 16 . . . blog-dshr-org-8024 20 1 My -PRON- PRP$ blog-dshr-org-8024 20 2 Firefox Firefox NNP blog-dshr-org-8024 20 3 trusts trust VBZ blog-dshr-org-8024 20 4 140 140 CD blog-dshr-org-8024 20 5 certificates certificate NNS blog-dshr-org-8024 20 6 from from IN blog-dshr-org-8024 20 7 71 71 CD blog-dshr-org-8024 20 8 different different JJ blog-dshr-org-8024 20 9 organizations organization NNS blog-dshr-org-8024 20 10 including include VBG blog-dshr-org-8024 20 11 , , , blog-dshr-org-8024 20 12 for for IN blog-dshr-org-8024 20 13 example example NN blog-dshr-org-8024 20 14 , , , blog-dshr-org-8024 20 15 Amazon Amazon NNP blog-dshr-org-8024 20 16 and and CC blog-dshr-org-8024 20 17 Google Google NNP blog-dshr-org-8024 20 18 , , , blog-dshr-org-8024 20 19 but but CC blog-dshr-org-8024 20 20 also also RB blog-dshr-org-8024 20 21 Chunghwa Chunghwa NNP blog-dshr-org-8024 20 22 Telecom Telecom NNP blog-dshr-org-8024 20 23 Co. Co. NNP blog-dshr-org-8024 20 24 , , , blog-dshr-org-8024 20 25 Ltd. Ltd. NNP blog-dshr-org-8024 20 26 and and CC blog-dshr-org-8024 20 27 the the DT blog-dshr-org-8024 20 28 Dutch dutch JJ blog-dshr-org-8024 20 29 government government NN blog-dshr-org-8024 20 30 . . . blog-dshr-org-8024 21 1 Why why WRB blog-dshr-org-8024 21 2 is be VBZ blog-dshr-org-8024 21 3 this this DT blog-dshr-org-8024 21 4 list list NN blog-dshr-org-8024 21 5 a a DT blog-dshr-org-8024 21 6 problem problem NN blog-dshr-org-8024 21 7 ? ? . blog-dshr-org-8024 22 1 The the DT blog-dshr-org-8024 22 2 browser browser NN blog-dshr-org-8024 22 3 trusts trust VBZ blog-dshr-org-8024 22 4 all all DT blog-dshr-org-8024 22 5 of of IN blog-dshr-org-8024 22 6 them -PRON- PRP blog-dshr-org-8024 22 7 equally equally RB blog-dshr-org-8024 22 8 . . . blog-dshr-org-8024 23 1 The the DT blog-dshr-org-8024 23 2 browser browser NN blog-dshr-org-8024 23 3 trusts trust VBZ blog-dshr-org-8024 23 4 CAs ca VBN blog-dshr-org-8024 23 5 that that IN blog-dshr-org-8024 23 6 the the DT blog-dshr-org-8024 23 7 CAs ca NNS blog-dshr-org-8024 23 8 on on IN blog-dshr-org-8024 23 9 the the DT blog-dshr-org-8024 23 10 list list NN blog-dshr-org-8024 23 11 delegate delegate NN blog-dshr-org-8024 23 12 trust trust NN blog-dshr-org-8024 23 13 to to IN blog-dshr-org-8024 23 14 . . . blog-dshr-org-8024 24 1 Back back RB blog-dshr-org-8024 24 2 in in IN blog-dshr-org-8024 24 3 2010 2010 CD blog-dshr-org-8024 24 4 , , , blog-dshr-org-8024 24 5 the the DT blog-dshr-org-8024 24 6 EFF EFF NNP blog-dshr-org-8024 24 7 found find VBD blog-dshr-org-8024 24 8 more more JJR blog-dshr-org-8024 24 9 than than IN blog-dshr-org-8024 24 10 650 650 CD blog-dshr-org-8024 24 11 organizations organization NNS blog-dshr-org-8024 24 12 that that WDT blog-dshr-org-8024 24 13 Internet internet NN blog-dshr-org-8024 24 14 Explorer Explorer NNP blog-dshr-org-8024 24 15 and and CC blog-dshr-org-8024 24 16 Firefox Firefox NNP blog-dshr-org-8024 24 17 trusted trust VBD blog-dshr-org-8024 24 18 . . . blog-dshr-org-8024 25 1 Commercial commercial JJ blog-dshr-org-8024 25 2 CAs CAs NNP blog-dshr-org-8024 25 3 on on IN blog-dshr-org-8024 25 4 the the DT blog-dshr-org-8024 25 5 list list NN blog-dshr-org-8024 25 6 , , , blog-dshr-org-8024 25 7 and and CC blog-dshr-org-8024 25 8 CAs ca NNS blog-dshr-org-8024 25 9 they -PRON- PRP blog-dshr-org-8024 25 10 delegate delegate VBP blog-dshr-org-8024 25 11 to to TO blog-dshr-org-8024 25 12 , , , blog-dshr-org-8024 25 13 have have VBP blog-dshr-org-8024 25 14 regularly regularly RB blog-dshr-org-8024 25 15 been be VBN blog-dshr-org-8024 25 16 found find VBN blog-dshr-org-8024 25 17 to to TO blog-dshr-org-8024 25 18 be be VB blog-dshr-org-8024 25 19 issuing issue VBG blog-dshr-org-8024 25 20 false false JJ blog-dshr-org-8024 25 21 or or CC blog-dshr-org-8024 25 22 insecure insecure JJ blog-dshr-org-8024 25 23 certificates certificate NNS blog-dshr-org-8024 25 24 . . . blog-dshr-org-8024 26 1 [ [ -LRB- blog-dshr-org-8024 26 2 Slide slide NN blog-dshr-org-8024 26 3 2 2 CD blog-dshr-org-8024 26 4 ] ] -RRB- blog-dshr-org-8024 26 5 One one CD blog-dshr-org-8024 26 6 of of IN blog-dshr-org-8024 26 7 these these DT blog-dshr-org-8024 26 8 trusted trust VBN blog-dshr-org-8024 26 9 organizations organization NNS blog-dshr-org-8024 26 10 is be VBZ blog-dshr-org-8024 26 11 the the DT blog-dshr-org-8024 26 12 Internet Internet NNP blog-dshr-org-8024 26 13 Security Security NNP blog-dshr-org-8024 26 14 Research Research NNP blog-dshr-org-8024 26 15 Group Group NNP blog-dshr-org-8024 26 16 , , , blog-dshr-org-8024 26 17 a a DT blog-dshr-org-8024 26 18 not not RB blog-dshr-org-8024 26 19 - - HYPH blog-dshr-org-8024 26 20 for for IN blog-dshr-org-8024 26 21 - - HYPH blog-dshr-org-8024 26 22 profit profit NN blog-dshr-org-8024 26 23 organization organization NN blog-dshr-org-8024 26 24 hosted host VBN blog-dshr-org-8024 26 25 by by IN blog-dshr-org-8024 26 26 the the DT blog-dshr-org-8024 26 27 Linux Linux NNP blog-dshr-org-8024 26 28 Foundation Foundation NNP blog-dshr-org-8024 26 29 and and CC blog-dshr-org-8024 26 30 sponsored sponsor VBN blog-dshr-org-8024 26 31 by by IN blog-dshr-org-8024 26 32 many many JJ blog-dshr-org-8024 26 33 organizations organization NNS blog-dshr-org-8024 26 34 including include VBG blog-dshr-org-8024 26 35 Mozilla Mozilla NNP blog-dshr-org-8024 26 36 and and CC blog-dshr-org-8024 26 37 the the DT blog-dshr-org-8024 26 38 EFF EFF NNP blog-dshr-org-8024 26 39 , , , blog-dshr-org-8024 26 40 which which WDT blog-dshr-org-8024 26 41 has have VBZ blog-dshr-org-8024 26 42 greatly greatly RB blog-dshr-org-8024 26 43 improved improve VBN blog-dshr-org-8024 26 44 the the DT blog-dshr-org-8024 26 45 information information NN blog-dshr-org-8024 26 46 hygiene hygiene NN blog-dshr-org-8024 26 47 of of IN blog-dshr-org-8024 26 48 the the DT blog-dshr-org-8024 26 49 Web web NN blog-dshr-org-8024 26 50 through through IN blog-dshr-org-8024 26 51 a a DT blog-dshr-org-8024 26 52 program program NN blog-dshr-org-8024 26 53 called call VBN blog-dshr-org-8024 26 54 Let let VB blog-dshr-org-8024 26 55 's -PRON- PRP blog-dshr-org-8024 26 56 Encrypt Encrypt NNP blog-dshr-org-8024 26 57 . . . blog-dshr-org-8024 27 1 This this DT blog-dshr-org-8024 27 2 has have VBZ blog-dshr-org-8024 27 3 provided provide VBN blog-dshr-org-8024 27 4 over over IN blog-dshr-org-8024 27 5 225 225 CD blog-dshr-org-8024 27 6 million million CD blog-dshr-org-8024 27 7 Web web NN blog-dshr-org-8024 27 8 sites site NNS blog-dshr-org-8024 27 9 with with IN blog-dshr-org-8024 27 10 free free JJ blog-dshr-org-8024 27 11 certificates certificate NNS blog-dshr-org-8024 27 12 carrying carry VBG blog-dshr-org-8024 27 13 a a DT blog-dshr-org-8024 27 14 signature signature NN blog-dshr-org-8024 27 15 chain chain NN blog-dshr-org-8024 27 16 rooted root VBN blog-dshr-org-8024 27 17 in in IN blog-dshr-org-8024 27 18 a a DT blog-dshr-org-8024 27 19 certificate certificate NN blog-dshr-org-8024 27 20 that that WDT blog-dshr-org-8024 27 21 almost almost RB blog-dshr-org-8024 27 22 all all DT blog-dshr-org-8024 27 23 browsers browser NNS blog-dshr-org-8024 27 24 trust trust NN blog-dshr-org-8024 27 25 . . . blog-dshr-org-8024 28 1 My -PRON- PRP$ blog-dshr-org-8024 28 2 blog blog NN blog-dshr-org-8024 28 3 's 's POS blog-dshr-org-8024 28 4 certificate certificate NN blog-dshr-org-8024 28 5 is be VBZ blog-dshr-org-8024 28 6 one one CD blog-dshr-org-8024 28 7 of of IN blog-dshr-org-8024 28 8 them -PRON- PRP blog-dshr-org-8024 28 9 , , , blog-dshr-org-8024 28 10 as as IN blog-dshr-org-8024 28 11 you -PRON- PRP blog-dshr-org-8024 28 12 can can MD blog-dshr-org-8024 28 13 see see VB blog-dshr-org-8024 28 14 by by IN blog-dshr-org-8024 28 15 clicking click VBG blog-dshr-org-8024 28 16 on on IN blog-dshr-org-8024 28 17 the the DT blog-dshr-org-8024 28 18 padlock padlock NN blog-dshr-org-8024 28 19 icon icon NN blog-dshr-org-8024 28 20 . . . blog-dshr-org-8024 29 1 [ [ -LRB- blog-dshr-org-8024 29 2 Slide slide NN blog-dshr-org-8024 29 3 3 3 CD blog-dshr-org-8024 29 4 ] ] -RRB- blog-dshr-org-8024 29 5 Barysevich Barysevich NNP blog-dshr-org-8024 29 6 identified identify VBD blog-dshr-org-8024 29 7 four four CD blog-dshr-org-8024 29 8 such such JJ blog-dshr-org-8024 29 9 sellers seller NNS blog-dshr-org-8024 29 10 of of IN blog-dshr-org-8024 29 11 counterfeit counterfeit JJ blog-dshr-org-8024 29 12 certificates certificate NNS blog-dshr-org-8024 29 13 since since IN blog-dshr-org-8024 29 14 2011 2011 CD blog-dshr-org-8024 29 15 . . . blog-dshr-org-8024 30 1 Two two CD blog-dshr-org-8024 30 2 of of IN blog-dshr-org-8024 30 3 them -PRON- PRP blog-dshr-org-8024 30 4 remain remain VBP blog-dshr-org-8024 30 5 in in IN blog-dshr-org-8024 30 6 business business NN blog-dshr-org-8024 30 7 today today NN blog-dshr-org-8024 30 8 . . . blog-dshr-org-8024 31 1 The the DT blog-dshr-org-8024 31 2 sellers seller NNS blog-dshr-org-8024 31 3 offered offer VBD blog-dshr-org-8024 31 4 a a DT blog-dshr-org-8024 31 5 variety variety NN blog-dshr-org-8024 31 6 of of IN blog-dshr-org-8024 31 7 options option NNS blog-dshr-org-8024 31 8 . . . blog-dshr-org-8024 32 1 In in IN blog-dshr-org-8024 32 2 2014 2014 CD blog-dshr-org-8024 32 3 , , , blog-dshr-org-8024 32 4 one one CD blog-dshr-org-8024 32 5 provider provider NN blog-dshr-org-8024 32 6 calling call VBG blog-dshr-org-8024 32 7 himself -PRON- PRP blog-dshr-org-8024 32 8 C@T C@T NNP blog-dshr-org-8024 32 9 advertised advertise VBD blog-dshr-org-8024 32 10 certificates certificate NNS blog-dshr-org-8024 32 11 that that WDT blog-dshr-org-8024 32 12 used use VBD blog-dshr-org-8024 32 13 a a DT blog-dshr-org-8024 32 14 Microsoft Microsoft NNP blog-dshr-org-8024 32 15 technology technology NN blog-dshr-org-8024 32 16 known know VBN blog-dshr-org-8024 32 17 as as IN blog-dshr-org-8024 32 18 Authenticode Authenticode NNP blog-dshr-org-8024 32 19 for for IN blog-dshr-org-8024 32 20 signing sign VBG blog-dshr-org-8024 32 21 executable executable JJ blog-dshr-org-8024 32 22 files file NNS blog-dshr-org-8024 32 23 and and CC blog-dshr-org-8024 32 24 programming programming NN blog-dshr-org-8024 32 25 scripts script NNS blog-dshr-org-8024 32 26 that that WDT blog-dshr-org-8024 32 27 can can MD blog-dshr-org-8024 32 28 install install VB blog-dshr-org-8024 32 29 software software NN blog-dshr-org-8024 32 30 . . . blog-dshr-org-8024 33 1 C@T C@T NNP blog-dshr-org-8024 33 2 offered offer VBD blog-dshr-org-8024 33 3 code code NN blog-dshr-org-8024 33 4 - - HYPH blog-dshr-org-8024 33 5 signing signing NN blog-dshr-org-8024 33 6 certificates certificate NNS blog-dshr-org-8024 33 7 for for IN blog-dshr-org-8024 33 8 macOS macos NN blog-dshr-org-8024 33 9 apps app NNS blog-dshr-org-8024 33 10 as as RB blog-dshr-org-8024 33 11 well well RB blog-dshr-org-8024 33 12 . . . blog-dshr-org-8024 34 1 ... ... : blog-dshr-org-8024 34 2 " " `` blog-dshr-org-8024 34 3 In in IN blog-dshr-org-8024 34 4 his -PRON- PRP$ blog-dshr-org-8024 34 5 advertisement advertisement NN blog-dshr-org-8024 34 6 , , , blog-dshr-org-8024 34 7 C@T C@T NNP blog-dshr-org-8024 34 8 explained explain VBD blog-dshr-org-8024 34 9 that that IN blog-dshr-org-8024 34 10 the the DT blog-dshr-org-8024 34 11 certificates certificate NNS blog-dshr-org-8024 34 12 are be VBP blog-dshr-org-8024 34 13 registered register VBN blog-dshr-org-8024 34 14 under under IN blog-dshr-org-8024 34 15 legitimate legitimate JJ blog-dshr-org-8024 34 16 corporations corporation NNS blog-dshr-org-8024 34 17 and and CC blog-dshr-org-8024 34 18 issued issue VBN blog-dshr-org-8024 34 19 by by IN blog-dshr-org-8024 34 20 Comodo Comodo NNP blog-dshr-org-8024 34 21 , , , blog-dshr-org-8024 34 22 Thawte Thawte NNP blog-dshr-org-8024 34 23 , , , blog-dshr-org-8024 34 24 and and CC blog-dshr-org-8024 34 25 Symantec Symantec NNP blog-dshr-org-8024 34 26 — — : blog-dshr-org-8024 34 27 the the DT blog-dshr-org-8024 34 28 largest large JJS blog-dshr-org-8024 34 29 and and CC blog-dshr-org-8024 34 30 most most RBS blog-dshr-org-8024 34 31 respected respected JJ blog-dshr-org-8024 34 32 issuers issuer NNS blog-dshr-org-8024 34 33 , , , blog-dshr-org-8024 34 34 " " `` blog-dshr-org-8024 34 35 Dan Dan NNP blog-dshr-org-8024 34 36 Goodin Goodin NNP blog-dshr-org-8024 34 37 One one CD blog-dshr-org-8024 34 38 - - HYPH blog-dshr-org-8024 34 39 stop stop VB blog-dshr-org-8024 34 40 counterfeit counterfeit JJ blog-dshr-org-8024 34 41 certificate certificate NN blog-dshr-org-8024 34 42 shops shop NNS blog-dshr-org-8024 34 43 for for IN blog-dshr-org-8024 34 44 all all PDT blog-dshr-org-8024 34 45 your -PRON- PRP$ blog-dshr-org-8024 34 46 malware malware NN blog-dshr-org-8024 34 47 - - HYPH blog-dshr-org-8024 34 48 signing signing NN blog-dshr-org-8024 34 49 needs need NNS blog-dshr-org-8024 34 50 Abuse abuse NN blog-dshr-org-8024 34 51 of of IN blog-dshr-org-8024 34 52 the the DT blog-dshr-org-8024 34 53 trust trust NN blog-dshr-org-8024 34 54 users user NNS blog-dshr-org-8024 34 55 place place NN blog-dshr-org-8024 34 56 in in IN blog-dshr-org-8024 34 57 CAs CAs NNP blog-dshr-org-8024 34 58 is be VBZ blog-dshr-org-8024 34 59 routine routine JJ blog-dshr-org-8024 34 60 : : : blog-dshr-org-8024 34 61 In in IN blog-dshr-org-8024 34 62 one one CD blog-dshr-org-8024 34 63 case case NN blog-dshr-org-8024 34 64 , , , blog-dshr-org-8024 34 65 a a DT blog-dshr-org-8024 34 66 prominent prominent JJ blog-dshr-org-8024 34 67 Dutch Dutch NNP blog-dshr-org-8024 34 68 CA CA NNP blog-dshr-org-8024 34 69 ( ( -LRB- blog-dshr-org-8024 34 70 DigiNotar DigiNotar NNP blog-dshr-org-8024 34 71 ) ) -RRB- blog-dshr-org-8024 34 72 was be VBD blog-dshr-org-8024 34 73 compromised compromise VBN blog-dshr-org-8024 34 74 and and CC blog-dshr-org-8024 34 75 the the DT blog-dshr-org-8024 34 76 hackers hacker NNS blog-dshr-org-8024 34 77 were be VBD blog-dshr-org-8024 34 78 able able JJ blog-dshr-org-8024 34 79 to to TO blog-dshr-org-8024 34 80 use use VB blog-dshr-org-8024 34 81 the the DT blog-dshr-org-8024 34 82 CA CA NNP blog-dshr-org-8024 34 83 ’s ’s POS blog-dshr-org-8024 34 84 system system NN blog-dshr-org-8024 34 85 to to TO blog-dshr-org-8024 34 86 issue issue VB blog-dshr-org-8024 34 87 fake fake JJ blog-dshr-org-8024 34 88 SSL SSL NNP blog-dshr-org-8024 34 89 certificates certificate NNS blog-dshr-org-8024 34 90 . . . blog-dshr-org-8024 35 1 The the DT blog-dshr-org-8024 35 2 certificates certificate NNS blog-dshr-org-8024 35 3 were be VBD blog-dshr-org-8024 35 4 used use VBN blog-dshr-org-8024 35 5 to to TO blog-dshr-org-8024 35 6 impersonate impersonate VB blog-dshr-org-8024 35 7 numerous numerous JJ blog-dshr-org-8024 35 8 sites site NNS blog-dshr-org-8024 35 9 in in IN blog-dshr-org-8024 35 10 Iran Iran NNP blog-dshr-org-8024 35 11 , , , blog-dshr-org-8024 35 12 such such JJ blog-dshr-org-8024 35 13 as as IN blog-dshr-org-8024 35 14 Gmail Gmail NNP blog-dshr-org-8024 35 15 and and CC blog-dshr-org-8024 35 16 Facebook Facebook NNP blog-dshr-org-8024 35 17 , , , blog-dshr-org-8024 35 18 which which WDT blog-dshr-org-8024 35 19 enabled enable VBD blog-dshr-org-8024 35 20 the the DT blog-dshr-org-8024 35 21 operators operator NNS blog-dshr-org-8024 35 22 of of IN blog-dshr-org-8024 35 23 the the DT blog-dshr-org-8024 35 24 fake fake JJ blog-dshr-org-8024 35 25 sites site NNS blog-dshr-org-8024 35 26 to to TO blog-dshr-org-8024 35 27 spy spy VB blog-dshr-org-8024 35 28 on on IN blog-dshr-org-8024 35 29 unsuspecting unsuspecting JJ blog-dshr-org-8024 35 30 site site NN blog-dshr-org-8024 35 31 users user NNS blog-dshr-org-8024 35 32 . . . blog-dshr-org-8024 36 1 ... ... NFP blog-dshr-org-8024 36 2 More more RBR blog-dshr-org-8024 36 3 recently recently RB blog-dshr-org-8024 36 4 , , , blog-dshr-org-8024 36 5 a a DT blog-dshr-org-8024 36 6 large large JJ blog-dshr-org-8024 36 7 U.S.-based u.s.-based JJ blog-dshr-org-8024 36 8 CA CA NNP blog-dshr-org-8024 36 9 ( ( -LRB- blog-dshr-org-8024 36 10 TrustWave TrustWave NNP blog-dshr-org-8024 36 11 ) ) -RRB- blog-dshr-org-8024 36 12 admitted admit VBD blog-dshr-org-8024 36 13 that that IN blog-dshr-org-8024 36 14 it -PRON- PRP blog-dshr-org-8024 36 15 issued issue VBD blog-dshr-org-8024 36 16 subordinate subordinate JJ blog-dshr-org-8024 36 17 root root NN blog-dshr-org-8024 36 18 certificates certificate NNS blog-dshr-org-8024 36 19 to to IN blog-dshr-org-8024 36 20 one one CD blog-dshr-org-8024 36 21 of of IN blog-dshr-org-8024 36 22 its -PRON- PRP$ blog-dshr-org-8024 36 23 customers customer NNS blog-dshr-org-8024 36 24 so so IN blog-dshr-org-8024 36 25 the the DT blog-dshr-org-8024 36 26 customer customer NN blog-dshr-org-8024 36 27 could could MD blog-dshr-org-8024 36 28 monitor monitor VB blog-dshr-org-8024 36 29 traffic traffic NN blog-dshr-org-8024 36 30 on on IN blog-dshr-org-8024 36 31 their -PRON- PRP$ blog-dshr-org-8024 36 32 internal internal JJ blog-dshr-org-8024 36 33 network network NN blog-dshr-org-8024 36 34 . . . blog-dshr-org-8024 37 1 Subordinate subordinate JJ blog-dshr-org-8024 37 2 root root NN blog-dshr-org-8024 37 3 certificates certificate NNS blog-dshr-org-8024 37 4 can can MD blog-dshr-org-8024 37 5 be be VB blog-dshr-org-8024 37 6 used use VBN blog-dshr-org-8024 37 7 to to TO blog-dshr-org-8024 37 8 create create VB blog-dshr-org-8024 37 9 SSL SSL NNP blog-dshr-org-8024 37 10 certificates certificate NNS blog-dshr-org-8024 37 11 for for IN blog-dshr-org-8024 37 12 nearly nearly RB blog-dshr-org-8024 37 13 any any DT blog-dshr-org-8024 37 14 domain domain NN blog-dshr-org-8024 37 15 on on IN blog-dshr-org-8024 37 16 the the DT blog-dshr-org-8024 37 17 Internet internet NN blog-dshr-org-8024 37 18 . . . blog-dshr-org-8024 38 1 Although although IN blog-dshr-org-8024 38 2 Trustwave Trustwave NNP blog-dshr-org-8024 38 3 has have VBZ blog-dshr-org-8024 38 4 revoked revoke VBN blog-dshr-org-8024 38 5 the the DT blog-dshr-org-8024 38 6 certificate certificate NN blog-dshr-org-8024 38 7 and and CC blog-dshr-org-8024 38 8 stated state VBD blog-dshr-org-8024 38 9 that that IN blog-dshr-org-8024 38 10 it -PRON- PRP blog-dshr-org-8024 38 11 will will MD blog-dshr-org-8024 38 12 no no RB blog-dshr-org-8024 38 13 longer long RBR blog-dshr-org-8024 38 14 issue issue VB blog-dshr-org-8024 38 15 subordinate subordinate JJ blog-dshr-org-8024 38 16 root root NN blog-dshr-org-8024 38 17 certificates certificate NNS blog-dshr-org-8024 38 18 to to IN blog-dshr-org-8024 38 19 customers customer NNS blog-dshr-org-8024 38 20 , , , blog-dshr-org-8024 38 21 it -PRON- PRP blog-dshr-org-8024 38 22 illustrates illustrate VBZ blog-dshr-org-8024 38 23 just just RB blog-dshr-org-8024 38 24 how how WRB blog-dshr-org-8024 38 25 easy easy JJ blog-dshr-org-8024 38 26 it -PRON- PRP blog-dshr-org-8024 38 27 is be VBZ blog-dshr-org-8024 38 28 for for IN blog-dshr-org-8024 38 29 CAs ca NNS blog-dshr-org-8024 38 30 to to TO blog-dshr-org-8024 38 31 make make VB blog-dshr-org-8024 38 32 missteps misstep NNS blog-dshr-org-8024 38 33 and and CC blog-dshr-org-8024 38 34 just just RB blog-dshr-org-8024 38 35 how how WRB blog-dshr-org-8024 38 36 severe severe JJ blog-dshr-org-8024 38 37 the the DT blog-dshr-org-8024 38 38 consequences consequence NNS blog-dshr-org-8024 38 39 of of IN blog-dshr-org-8024 38 40 those those DT blog-dshr-org-8024 38 41 missteps misstep NNS blog-dshr-org-8024 38 42 might may MD blog-dshr-org-8024 38 43 be be VB blog-dshr-org-8024 38 44 . . . blog-dshr-org-8024 39 1 In in IN blog-dshr-org-8024 39 2 2018 2018 CD blog-dshr-org-8024 39 3 Sennheiser Sennheiser NNP blog-dshr-org-8024 39 4 provided provide VBD blog-dshr-org-8024 39 5 another another DT blog-dshr-org-8024 39 6 example example NN blog-dshr-org-8024 39 7 : : : blog-dshr-org-8024 39 8 The the DT blog-dshr-org-8024 39 9 issue issue NN blog-dshr-org-8024 39 10 with with IN blog-dshr-org-8024 39 11 the the DT blog-dshr-org-8024 39 12 two two CD blog-dshr-org-8024 39 13 HeadSetup HeadSetup NNP blog-dshr-org-8024 39 14 apps app NNS blog-dshr-org-8024 39 15 came come VBD blog-dshr-org-8024 39 16 to to IN blog-dshr-org-8024 39 17 light light NN blog-dshr-org-8024 39 18 earlier early RBR blog-dshr-org-8024 39 19 this this DT blog-dshr-org-8024 39 20 year year NN blog-dshr-org-8024 39 21 when when WRB blog-dshr-org-8024 39 22 German german JJ blog-dshr-org-8024 39 23 cyber cyber NN blog-dshr-org-8024 39 24 - - HYPH blog-dshr-org-8024 39 25 security security NN blog-dshr-org-8024 39 26 firm firm NN blog-dshr-org-8024 39 27 Secorvo Secorvo NNPS blog-dshr-org-8024 39 28 found find VBD blog-dshr-org-8024 39 29 that that IN blog-dshr-org-8024 39 30 versions version NNS blog-dshr-org-8024 39 31 7.3 7.3 CD blog-dshr-org-8024 39 32 , , , blog-dshr-org-8024 39 33 7.4 7.4 CD blog-dshr-org-8024 39 34 , , , blog-dshr-org-8024 39 35 and and CC blog-dshr-org-8024 39 36 8.0 8.0 CD blog-dshr-org-8024 39 37 installed instal VBN blog-dshr-org-8024 39 38 two two CD blog-dshr-org-8024 39 39 root root NN blog-dshr-org-8024 39 40 Certification Certification NNP blog-dshr-org-8024 39 41 Authority Authority NNP blog-dshr-org-8024 39 42 ( ( -LRB- blog-dshr-org-8024 39 43 CA CA NNP blog-dshr-org-8024 39 44 ) ) -RRB- blog-dshr-org-8024 39 45 certificates certificate VBZ blog-dshr-org-8024 39 46 into into IN blog-dshr-org-8024 39 47 the the DT blog-dshr-org-8024 39 48 Windows Windows NNP blog-dshr-org-8024 39 49 Trusted Trusted NNP blog-dshr-org-8024 39 50 Root Root NNP blog-dshr-org-8024 39 51 Certificate Certificate NNP blog-dshr-org-8024 39 52 Store Store NNP blog-dshr-org-8024 39 53 of of IN blog-dshr-org-8024 39 54 users user NNS blog-dshr-org-8024 39 55 ' ' POS blog-dshr-org-8024 39 56 computers computer NNS blog-dshr-org-8024 39 57 but but CC blog-dshr-org-8024 39 58 also also RB blog-dshr-org-8024 39 59 included include VBD blog-dshr-org-8024 39 60 the the DT blog-dshr-org-8024 39 61 private private JJ blog-dshr-org-8024 39 62 keys key NNS blog-dshr-org-8024 39 63 for for IN blog-dshr-org-8024 39 64 all all DT blog-dshr-org-8024 39 65 in in IN blog-dshr-org-8024 39 66 the the DT blog-dshr-org-8024 39 67 SennComCCKey.pem SennComCCKey.pem NNP blog-dshr-org-8024 39 68 file file NN blog-dshr-org-8024 39 69 . . . blog-dshr-org-8024 40 1 Certificates certificate NNS blog-dshr-org-8024 40 2 depend depend VBP blog-dshr-org-8024 40 3 on on IN blog-dshr-org-8024 40 4 public public JJ blog-dshr-org-8024 40 5 - - HYPH blog-dshr-org-8024 40 6 key key NN blog-dshr-org-8024 40 7 cryptography cryptography NN blog-dshr-org-8024 40 8 , , , blog-dshr-org-8024 40 9 which which WDT blog-dshr-org-8024 40 10 splits split VBZ blog-dshr-org-8024 40 11 keys key NNS blog-dshr-org-8024 40 12 into into IN blog-dshr-org-8024 40 13 public public JJ blog-dshr-org-8024 40 14 / / SYM blog-dshr-org-8024 40 15 private private JJ blog-dshr-org-8024 40 16 key key JJ blog-dshr-org-8024 40 17 pairs pair NNS blog-dshr-org-8024 40 18 . . . blog-dshr-org-8024 41 1 Private private JJ blog-dshr-org-8024 41 2 keys key NNS blog-dshr-org-8024 41 3 can can MD blog-dshr-org-8024 41 4 decrypt decrypt JJ blog-dshr-org-8024 41 5 text text NN blog-dshr-org-8024 41 6 encrypted encrypt VBN blog-dshr-org-8024 41 7 by by IN blog-dshr-org-8024 41 8 the the DT blog-dshr-org-8024 41 9 public public JJ blog-dshr-org-8024 41 10 key key NN blog-dshr-org-8024 41 11 , , , blog-dshr-org-8024 41 12 and and CC blog-dshr-org-8024 41 13 vice vice NN blog-dshr-org-8024 41 14 versa versa RB blog-dshr-org-8024 41 15 . . . blog-dshr-org-8024 42 1 The the DT blog-dshr-org-8024 42 2 security security NN blog-dshr-org-8024 42 3 of of IN blog-dshr-org-8024 42 4 the the DT blog-dshr-org-8024 42 5 system system NN blog-dshr-org-8024 42 6 depends depend VBZ blog-dshr-org-8024 42 7 upon upon IN blog-dshr-org-8024 42 8 private private JJ blog-dshr-org-8024 42 9 keys key NNS blog-dshr-org-8024 42 10 being be VBG blog-dshr-org-8024 42 11 kept keep VBN blog-dshr-org-8024 42 12 secret secret JJ blog-dshr-org-8024 42 13 . . . blog-dshr-org-8024 43 1 This this DT blog-dshr-org-8024 43 2 poses pose VBZ blog-dshr-org-8024 43 3 two two CD blog-dshr-org-8024 43 4 problems problem NNS blog-dshr-org-8024 43 5 : : : blog-dshr-org-8024 43 6 As as IN blog-dshr-org-8024 43 7 the the DT blog-dshr-org-8024 43 8 Sennheiser Sennheiser NNP blog-dshr-org-8024 43 9 example example NN blog-dshr-org-8024 43 10 shows show VBZ blog-dshr-org-8024 43 11 , , , blog-dshr-org-8024 43 12 it -PRON- PRP blog-dshr-org-8024 43 13 is be VBZ blog-dshr-org-8024 43 14 easy easy JJ blog-dshr-org-8024 43 15 for for IN blog-dshr-org-8024 43 16 the the DT blog-dshr-org-8024 43 17 private private JJ blog-dshr-org-8024 43 18 keys key NNS blog-dshr-org-8024 43 19 to to TO blog-dshr-org-8024 43 20 leak leak VB blog-dshr-org-8024 43 21 . . . blog-dshr-org-8024 44 1 Another another DT blog-dshr-org-8024 44 2 common common JJ blog-dshr-org-8024 44 3 way way NN blog-dshr-org-8024 44 4 for for IN blog-dshr-org-8024 44 5 them -PRON- PRP blog-dshr-org-8024 44 6 to to TO blog-dshr-org-8024 44 7 leak leak VB blog-dshr-org-8024 44 8 is be VBZ blog-dshr-org-8024 44 9 for for IN blog-dshr-org-8024 44 10 a a DT blog-dshr-org-8024 44 11 server server NN blog-dshr-org-8024 44 12 to to TO blog-dshr-org-8024 44 13 be be VB blog-dshr-org-8024 44 14 compromised compromise VBN blog-dshr-org-8024 44 15 . . . blog-dshr-org-8024 45 1 For for IN blog-dshr-org-8024 45 2 the the DT blog-dshr-org-8024 45 3 server server NN blog-dshr-org-8024 45 4 to to TO blog-dshr-org-8024 45 5 be be VB blog-dshr-org-8024 45 6 able able JJ blog-dshr-org-8024 45 7 to to TO blog-dshr-org-8024 45 8 verify verify VB blog-dshr-org-8024 45 9 its -PRON- PRP$ blog-dshr-org-8024 45 10 identity identity NN blog-dshr-org-8024 45 11 , , , blog-dshr-org-8024 45 12 and and CC blog-dshr-org-8024 45 13 thus thus RB blog-dshr-org-8024 45 14 unlock unlock VB blog-dshr-org-8024 45 15 the the DT blog-dshr-org-8024 45 16 padlock padlock NN blog-dshr-org-8024 45 17 , , , blog-dshr-org-8024 45 18 the the DT blog-dshr-org-8024 45 19 private private JJ blog-dshr-org-8024 45 20 key key NN blog-dshr-org-8024 45 21 needs need VBZ blog-dshr-org-8024 45 22 to to TO blog-dshr-org-8024 45 23 be be VB blog-dshr-org-8024 45 24 stored store VBN blog-dshr-org-8024 45 25 on on IN blog-dshr-org-8024 45 26 the the DT blog-dshr-org-8024 45 27 server server NN blog-dshr-org-8024 45 28 in in IN blog-dshr-org-8024 45 29 cleartext cleartext NNP blog-dshr-org-8024 45 30 . . . blog-dshr-org-8024 46 1 So so IN blog-dshr-org-8024 46 2 an an DT blog-dshr-org-8024 46 3 intruder intruder NN blog-dshr-org-8024 46 4 can can MD blog-dshr-org-8024 46 5 steal steal VB blog-dshr-org-8024 46 6 it -PRON- PRP blog-dshr-org-8024 46 7 to to TO blog-dshr-org-8024 46 8 impersonate impersonate VB blog-dshr-org-8024 46 9 the the DT blog-dshr-org-8024 46 10 server server NN blog-dshr-org-8024 46 11 . . . blog-dshr-org-8024 47 1 There there EX blog-dshr-org-8024 47 2 is be VBZ blog-dshr-org-8024 47 3 no no DT blog-dshr-org-8024 47 4 alarm alarm NN blog-dshr-org-8024 47 5 bell bell NN blog-dshr-org-8024 47 6 or or CC blog-dshr-org-8024 47 7 notification notification NN blog-dshr-org-8024 47 8 to to IN blog-dshr-org-8024 47 9 the the DT blog-dshr-org-8024 47 10 owner owner NN blog-dshr-org-8024 47 11 or or CC blog-dshr-org-8024 47 12 affected affect VBN blog-dshr-org-8024 47 13 users user NNS blog-dshr-org-8024 47 14 when when WRB blog-dshr-org-8024 47 15 a a DT blog-dshr-org-8024 47 16 private private JJ blog-dshr-org-8024 47 17 key key JJ blog-dshr-org-8024 47 18 leaks leak NNS blog-dshr-org-8024 47 19 . . . blog-dshr-org-8024 48 1 So so RB blog-dshr-org-8024 48 2 , , , blog-dshr-org-8024 48 3 as as IN blog-dshr-org-8024 48 4 in in IN blog-dshr-org-8024 48 5 the the DT blog-dshr-org-8024 48 6 Sennheiser Sennheiser NNP blog-dshr-org-8024 48 7 case case NN blog-dshr-org-8024 48 8 , , , blog-dshr-org-8024 48 9 the the DT blog-dshr-org-8024 48 10 attacker attacker NN blog-dshr-org-8024 48 11 may may MD blog-dshr-org-8024 48 12 be be VB blog-dshr-org-8024 48 13 able able JJ blog-dshr-org-8024 48 14 to to TO blog-dshr-org-8024 48 15 use use VB blog-dshr-org-8024 48 16 it -PRON- PRP blog-dshr-org-8024 48 17 unimpeded unimpeded JJ blog-dshr-org-8024 48 18 for for IN blog-dshr-org-8024 48 19 a a DT blog-dshr-org-8024 48 20 long long JJ blog-dshr-org-8024 48 21 time time NN blog-dshr-org-8024 48 22 , , , blog-dshr-org-8024 48 23 until until IN blog-dshr-org-8024 48 24 some some DT blog-dshr-org-8024 48 25 security security NN blog-dshr-org-8024 48 26 researcher researcher NN blog-dshr-org-8024 48 27 notices notice VBZ blog-dshr-org-8024 48 28 some some DT blog-dshr-org-8024 48 29 anomaly anomaly JJ blog-dshr-org-8024 48 30 . . . blog-dshr-org-8024 49 1 Catalin Catalin NNP blog-dshr-org-8024 49 2 Cimpanu Cimpanu NNP blog-dshr-org-8024 49 3 continues continue VBZ blog-dshr-org-8024 49 4 : : : blog-dshr-org-8024 49 5 In in IN blog-dshr-org-8024 49 6 a a DT blog-dshr-org-8024 49 7 report report NN blog-dshr-org-8024 49 8 published publish VBN blog-dshr-org-8024 49 9 today today NN blog-dshr-org-8024 49 10 , , , blog-dshr-org-8024 49 11 Secorvo Secorvo NNPS blog-dshr-org-8024 49 12 researchers researcher NNS blog-dshr-org-8024 49 13 published publish VBD blog-dshr-org-8024 49 14 proof proof NN blog-dshr-org-8024 49 15 - - HYPH blog-dshr-org-8024 49 16 of of IN blog-dshr-org-8024 49 17 - - HYPH blog-dshr-org-8024 49 18 concept concept NN blog-dshr-org-8024 49 19 code code NN blog-dshr-org-8024 49 20 showing show VBG blog-dshr-org-8024 49 21 how how WRB blog-dshr-org-8024 49 22 trivial trivial JJ blog-dshr-org-8024 49 23 would would MD blog-dshr-org-8024 49 24 be be VB blog-dshr-org-8024 49 25 for for IN blog-dshr-org-8024 49 26 an an DT blog-dshr-org-8024 49 27 attacker attacker NN blog-dshr-org-8024 49 28 to to TO blog-dshr-org-8024 49 29 analyze analyze VB blog-dshr-org-8024 49 30 the the DT blog-dshr-org-8024 49 31 installers installer NNS blog-dshr-org-8024 49 32 for for IN blog-dshr-org-8024 49 33 both both DT blog-dshr-org-8024 49 34 apps app NNS blog-dshr-org-8024 49 35 and and CC blog-dshr-org-8024 49 36 extract extract VB blog-dshr-org-8024 49 37 the the DT blog-dshr-org-8024 49 38 private private JJ blog-dshr-org-8024 49 39 keys key NNS blog-dshr-org-8024 49 40 . . . blog-dshr-org-8024 50 1 Making make VBG blog-dshr-org-8024 50 2 matters matter NNS blog-dshr-org-8024 50 3 worse worse RBR blog-dshr-org-8024 50 4 , , , blog-dshr-org-8024 50 5 the the DT blog-dshr-org-8024 50 6 certificates certificate NNS blog-dshr-org-8024 50 7 are be VBP blog-dshr-org-8024 50 8 also also RB blog-dshr-org-8024 50 9 installed instal VBN blog-dshr-org-8024 50 10 for for IN blog-dshr-org-8024 50 11 Mac Mac NNP blog-dshr-org-8024 50 12 users user NNS blog-dshr-org-8024 50 13 , , , blog-dshr-org-8024 50 14 via via IN blog-dshr-org-8024 50 15 HeadSetup HeadSetup NNP blog-dshr-org-8024 50 16 macOS macOS NNP blog-dshr-org-8024 50 17 app app NN blog-dshr-org-8024 50 18 versions version NNS blog-dshr-org-8024 50 19 , , , blog-dshr-org-8024 50 20 and and CC blog-dshr-org-8024 50 21 they -PRON- PRP blog-dshr-org-8024 50 22 are be VBP blog-dshr-org-8024 50 23 n't not RB blog-dshr-org-8024 50 24 removed remove VBN blog-dshr-org-8024 50 25 from from IN blog-dshr-org-8024 50 26 the the DT blog-dshr-org-8024 50 27 operating operating NN blog-dshr-org-8024 50 28 system system NN blog-dshr-org-8024 50 29 's 's POS blog-dshr-org-8024 50 30 Trusted Trusted NNP blog-dshr-org-8024 50 31 Root Root NNP blog-dshr-org-8024 50 32 Certificate Certificate NNP blog-dshr-org-8024 50 33 Store Store NNP blog-dshr-org-8024 50 34 during during IN blog-dshr-org-8024 50 35 current current JJ blog-dshr-org-8024 50 36 HeadSetup HeadSetup NNP blog-dshr-org-8024 50 37 updates update NNS blog-dshr-org-8024 50 38 or or CC blog-dshr-org-8024 50 39 uninstall uninstall JJ blog-dshr-org-8024 50 40 operations operation NNS blog-dshr-org-8024 50 41 . . . blog-dshr-org-8024 51 1 ... ... : blog-dshr-org-8024 51 2 Sennheiser Sennheiser NNP blog-dshr-org-8024 51 3 's 's POS blog-dshr-org-8024 51 4 snafu snafu NN blog-dshr-org-8024 51 5 ... ... NFP blog-dshr-org-8024 51 6 is be VBZ blog-dshr-org-8024 51 7 not not RB blog-dshr-org-8024 51 8 the the DT blog-dshr-org-8024 51 9 first first JJ blog-dshr-org-8024 51 10 of of IN blog-dshr-org-8024 51 11 its -PRON- PRP$ blog-dshr-org-8024 51 12 kind kind NN blog-dshr-org-8024 51 13 . . . blog-dshr-org-8024 52 1 In in IN blog-dshr-org-8024 52 2 2015 2015 CD blog-dshr-org-8024 52 3 , , , blog-dshr-org-8024 52 4 Lenovo Lenovo NNP blog-dshr-org-8024 52 5 shipped ship VBD blog-dshr-org-8024 52 6 laptops laptop NNS blog-dshr-org-8024 52 7 with with IN blog-dshr-org-8024 52 8 a a DT blog-dshr-org-8024 52 9 certificate certificate NN blog-dshr-org-8024 52 10 that that WDT blog-dshr-org-8024 52 11 exposed expose VBD blog-dshr-org-8024 52 12 its -PRON- PRP$ blog-dshr-org-8024 52 13 private private JJ blog-dshr-org-8024 52 14 key key NN blog-dshr-org-8024 52 15 in in IN blog-dshr-org-8024 52 16 a a DT blog-dshr-org-8024 52 17 scandal scandal NN blog-dshr-org-8024 52 18 that that WDT blog-dshr-org-8024 52 19 became become VBD blog-dshr-org-8024 52 20 known know VBN blog-dshr-org-8024 52 21 as as IN blog-dshr-org-8024 52 22 Superfish Superfish NNP blog-dshr-org-8024 52 23 . . . blog-dshr-org-8024 53 1 Dell Dell NNP blog-dshr-org-8024 53 2 did do VBD blog-dshr-org-8024 53 3 the the DT blog-dshr-org-8024 53 4 exact exact JJ blog-dshr-org-8024 53 5 same same JJ blog-dshr-org-8024 53 6 thing thing NN blog-dshr-org-8024 53 7 in in IN blog-dshr-org-8024 53 8 2016 2016 CD blog-dshr-org-8024 53 9 in in IN blog-dshr-org-8024 53 10 a a DT blog-dshr-org-8024 53 11 similarly similarly RB blog-dshr-org-8024 53 12 bad bad JJ blog-dshr-org-8024 53 13 security security NN blog-dshr-org-8024 53 14 incident incident NN blog-dshr-org-8024 53 15 that that WDT blog-dshr-org-8024 53 16 became become VBD blog-dshr-org-8024 53 17 known know VBN blog-dshr-org-8024 53 18 as as IN blog-dshr-org-8024 53 19 eDellRoot edellroot ADD blog-dshr-org-8024 53 20 . . . blog-dshr-org-8024 54 1 Cimpanu Cimpanu NNP blog-dshr-org-8024 54 2 also also RB blog-dshr-org-8024 54 3 reports report VBZ blog-dshr-org-8024 54 4 on on IN blog-dshr-org-8024 54 5 a a DT blog-dshr-org-8024 54 6 more more RBR blog-dshr-org-8024 54 7 recent recent JJ blog-dshr-org-8024 54 8 case case NN blog-dshr-org-8024 54 9 : : : blog-dshr-org-8024 54 10 Under under IN blog-dshr-org-8024 54 11 the the DT blog-dshr-org-8024 54 12 guise guise NN blog-dshr-org-8024 54 13 of of IN blog-dshr-org-8024 54 14 a a DT blog-dshr-org-8024 54 15 " " `` blog-dshr-org-8024 54 16 cybersecurity cybersecurity NN blog-dshr-org-8024 54 17 exercise exercise NN blog-dshr-org-8024 54 18 , , , blog-dshr-org-8024 54 19 " " '' blog-dshr-org-8024 54 20 the the DT blog-dshr-org-8024 54 21 Kazakhstan Kazakhstan NNP blog-dshr-org-8024 54 22 government government NN blog-dshr-org-8024 54 23 is be VBZ blog-dshr-org-8024 54 24 forcing force VBG blog-dshr-org-8024 54 25 citizens citizen NNS blog-dshr-org-8024 54 26 in in IN blog-dshr-org-8024 54 27 its -PRON- PRP$ blog-dshr-org-8024 54 28 capital capital NN blog-dshr-org-8024 54 29 of of IN blog-dshr-org-8024 54 30 Nur Nur NNP blog-dshr-org-8024 54 31 - - HYPH blog-dshr-org-8024 54 32 Sultan Sultan NNP blog-dshr-org-8024 54 33 ( ( -LRB- blog-dshr-org-8024 54 34 formerly formerly RB blog-dshr-org-8024 54 35 Astana Astana NNP blog-dshr-org-8024 54 36 ) ) -RRB- blog-dshr-org-8024 54 37 to to TO blog-dshr-org-8024 54 38 install install VB blog-dshr-org-8024 54 39 a a DT blog-dshr-org-8024 54 40 digital digital JJ blog-dshr-org-8024 54 41 certificate certificate NN blog-dshr-org-8024 54 42 on on IN blog-dshr-org-8024 54 43 their -PRON- PRP$ blog-dshr-org-8024 54 44 devices device NNS blog-dshr-org-8024 54 45 if if IN blog-dshr-org-8024 54 46 they -PRON- PRP blog-dshr-org-8024 54 47 want want VBP blog-dshr-org-8024 54 48 to to TO blog-dshr-org-8024 54 49 access access VB blog-dshr-org-8024 54 50 foreign foreign JJ blog-dshr-org-8024 54 51 internet internet NN blog-dshr-org-8024 54 52 services service NNS blog-dshr-org-8024 54 53 . . . blog-dshr-org-8024 55 1 Once once RB blog-dshr-org-8024 55 2 installed instal VBN blog-dshr-org-8024 55 3 , , , blog-dshr-org-8024 55 4 the the DT blog-dshr-org-8024 55 5 certificate certificate NN blog-dshr-org-8024 55 6 would would MD blog-dshr-org-8024 55 7 allow allow VB blog-dshr-org-8024 55 8 the the DT blog-dshr-org-8024 55 9 government government NN blog-dshr-org-8024 55 10 to to TO blog-dshr-org-8024 55 11 intercept intercept VB blog-dshr-org-8024 55 12 all all DT blog-dshr-org-8024 55 13 HTTPS HTTPS NNP blog-dshr-org-8024 55 14 traffic traffic NN blog-dshr-org-8024 55 15 made make VBN blog-dshr-org-8024 55 16 from from IN blog-dshr-org-8024 55 17 users user NNS blog-dshr-org-8024 55 18 ' ' POS blog-dshr-org-8024 55 19 devices device NNS blog-dshr-org-8024 55 20 via via IN blog-dshr-org-8024 55 21 a a DT blog-dshr-org-8024 55 22 technique technique NN blog-dshr-org-8024 55 23 called call VBN blog-dshr-org-8024 55 24 MitM MitM NNP blog-dshr-org-8024 55 25 ( ( -LRB- blog-dshr-org-8024 55 26 Man man NN blog-dshr-org-8024 55 27 - - HYPH blog-dshr-org-8024 55 28 in in IN blog-dshr-org-8024 55 29 - - HYPH blog-dshr-org-8024 55 30 the the DT blog-dshr-org-8024 55 31 - - HYPH blog-dshr-org-8024 55 32 Middle middle NN blog-dshr-org-8024 55 33 ) ) -RRB- blog-dshr-org-8024 55 34 . . . blog-dshr-org-8024 56 1 This this DT blog-dshr-org-8024 56 2 type type NN blog-dshr-org-8024 56 3 of of IN blog-dshr-org-8024 56 4 “ " `` blog-dshr-org-8024 56 5 mistake mistake NN blog-dshr-org-8024 56 6 ” " '' blog-dshr-org-8024 56 7 allows allow VBZ blog-dshr-org-8024 56 8 attackers attacker NNS blog-dshr-org-8024 56 9 to to TO blog-dshr-org-8024 56 10 impersonate impersonate VB blog-dshr-org-8024 56 11 any any DT blog-dshr-org-8024 56 12 Web web NN blog-dshr-org-8024 56 13 site site NN blog-dshr-org-8024 56 14 to to IN blog-dshr-org-8024 56 15 affected affect VBN blog-dshr-org-8024 56 16 devices device NNS blog-dshr-org-8024 56 17 . . . blog-dshr-org-8024 57 1 CAs CAs NNP blog-dshr-org-8024 57 2 are be VBP blog-dshr-org-8024 57 3 supposed suppose VBN blog-dshr-org-8024 57 4 to to TO blog-dshr-org-8024 57 5 issue issue VB blog-dshr-org-8024 57 6 three three CD blog-dshr-org-8024 57 7 grades grade NNS blog-dshr-org-8024 57 8 of of IN blog-dshr-org-8024 57 9 certificate certificate NN blog-dshr-org-8024 57 10 based base VBN blog-dshr-org-8024 57 11 on on IN blog-dshr-org-8024 57 12 increasingly increasingly RB blog-dshr-org-8024 57 13 rigorous rigorous JJ blog-dshr-org-8024 57 14 validation validation NN blog-dshr-org-8024 57 15 : : : blog-dshr-org-8024 57 16 Domain Domain NNP blog-dshr-org-8024 57 17 Validated Validated NNP blog-dshr-org-8024 57 18 ( ( -LRB- blog-dshr-org-8024 57 19 DV DV NNP blog-dshr-org-8024 57 20 ) ) -RRB- blog-dshr-org-8024 57 21 certificates certificate VBZ blog-dshr-org-8024 57 22 verify verify VBP blog-dshr-org-8024 57 23 control control NN blog-dshr-org-8024 57 24 over over IN blog-dshr-org-8024 57 25 the the DT blog-dshr-org-8024 57 26 DNS dns NN blog-dshr-org-8024 57 27 entries entry NNS blog-dshr-org-8024 57 28 , , , blog-dshr-org-8024 57 29 email email NN blog-dshr-org-8024 57 30 and and CC blog-dshr-org-8024 57 31 Web web NN blog-dshr-org-8024 57 32 content content NN blog-dshr-org-8024 57 33 of of IN blog-dshr-org-8024 57 34 the the DT blog-dshr-org-8024 57 35 specified specified JJ blog-dshr-org-8024 57 36 domain domain NN blog-dshr-org-8024 57 37 . . . blog-dshr-org-8024 58 1 They -PRON- PRP blog-dshr-org-8024 58 2 can can MD blog-dshr-org-8024 58 3 be be VB blog-dshr-org-8024 58 4 issued issue VBN blog-dshr-org-8024 58 5 via via IN blog-dshr-org-8024 58 6 automated automate VBN blog-dshr-org-8024 58 7 processes process NNS blog-dshr-org-8024 58 8 , , , blog-dshr-org-8024 58 9 as as IN blog-dshr-org-8024 58 10 with with IN blog-dshr-org-8024 58 11 Let let NNP blog-dshr-org-8024 58 12 's -PRON- PRP blog-dshr-org-8024 58 13 Encrypt Encrypt NNP blog-dshr-org-8024 58 14 . . . blog-dshr-org-8024 59 1 Organization Organization NNP blog-dshr-org-8024 59 2 Validated Validated NNP blog-dshr-org-8024 59 3 ( ( -LRB- blog-dshr-org-8024 59 4 OV OV NNP blog-dshr-org-8024 59 5 ) ) -RRB- blog-dshr-org-8024 59 6 certificates certificate NNS blog-dshr-org-8024 59 7 are be VBP blog-dshr-org-8024 59 8 supposed suppose VBN blog-dshr-org-8024 59 9 to to TO blog-dshr-org-8024 59 10 verify verify VB blog-dshr-org-8024 59 11 the the DT blog-dshr-org-8024 59 12 legal legal JJ blog-dshr-org-8024 59 13 entity entity NN blog-dshr-org-8024 59 14 behind behind IN blog-dshr-org-8024 59 15 the the DT blog-dshr-org-8024 59 16 DV DV NNP blog-dshr-org-8024 59 17 - - HYPH blog-dshr-org-8024 59 18 level level NN blog-dshr-org-8024 59 19 control control NN blog-dshr-org-8024 59 20 of of IN blog-dshr-org-8024 59 21 the the DT blog-dshr-org-8024 59 22 domain domain NN blog-dshr-org-8024 59 23 , , , blog-dshr-org-8024 59 24 but but CC blog-dshr-org-8024 59 25 in in IN blog-dshr-org-8024 59 26 practice practice NN blog-dshr-org-8024 59 27 are be VBP blog-dshr-org-8024 59 28 treated treat VBN blog-dshr-org-8024 59 29 the the DT blog-dshr-org-8024 59 30 same same JJ blog-dshr-org-8024 59 31 as as IN blog-dshr-org-8024 59 32 DV DV NNP blog-dshr-org-8024 59 33 certificates certificate NNS blog-dshr-org-8024 59 34 . . . blog-dshr-org-8024 60 1 Extended extended JJ blog-dshr-org-8024 60 2 Validation validation NN blog-dshr-org-8024 60 3 ( ( -LRB- blog-dshr-org-8024 60 4 EV EV NNP blog-dshr-org-8024 60 5 ) ) -RRB- blog-dshr-org-8024 60 6 certificates certificate NNS blog-dshr-org-8024 60 7 require require VBP blog-dshr-org-8024 60 8 " " `` blog-dshr-org-8024 60 9 verification verification NN blog-dshr-org-8024 60 10 of of IN blog-dshr-org-8024 60 11 the the DT blog-dshr-org-8024 60 12 requesting request VBG blog-dshr-org-8024 60 13 entity entity NN blog-dshr-org-8024 60 14 's 's POS blog-dshr-org-8024 60 15 identity identity NN blog-dshr-org-8024 60 16 by by IN blog-dshr-org-8024 60 17 a a DT blog-dshr-org-8024 60 18 certificate certificate NN blog-dshr-org-8024 60 19 authority authority NN blog-dshr-org-8024 60 20 ( ( -LRB- blog-dshr-org-8024 60 21 CA CA NNP blog-dshr-org-8024 60 22 ) ) -RRB- blog-dshr-org-8024 60 23 " " '' blog-dshr-org-8024 60 24 . . . blog-dshr-org-8024 61 1 Verification verification NN blog-dshr-org-8024 61 2 is be VBZ blog-dshr-org-8024 61 3 supposed suppose VBN blog-dshr-org-8024 61 4 to to TO blog-dshr-org-8024 61 5 be be VB blog-dshr-org-8024 61 6 an an DT blog-dshr-org-8024 61 7 intrusive intrusive JJ blog-dshr-org-8024 61 8 , , , blog-dshr-org-8024 61 9 human human JJ blog-dshr-org-8024 61 10 process process NN blog-dshr-org-8024 61 11 . . . blog-dshr-org-8024 62 1 [ [ -LRB- blog-dshr-org-8024 62 2 Slide slide NN blog-dshr-org-8024 62 3 4 4 CD blog-dshr-org-8024 62 4 ] ] -RRB- blog-dshr-org-8024 62 5 Source source NN blog-dshr-org-8024 62 6 But but CC blog-dshr-org-8024 62 7 , , , blog-dshr-org-8024 62 8 as as IN blog-dshr-org-8024 62 9 can can MD blog-dshr-org-8024 62 10 be be VB blog-dshr-org-8024 62 11 seen see VBN blog-dshr-org-8024 62 12 from from IN blog-dshr-org-8024 62 13 the the DT blog-dshr-org-8024 62 14 advert advert NN blog-dshr-org-8024 62 15 , , , blog-dshr-org-8024 62 16 the the DT blog-dshr-org-8024 62 17 Extended Extended NNP blog-dshr-org-8024 62 18 Verification Verification NNP blog-dshr-org-8024 62 19 process process NN blog-dshr-org-8024 62 20 is be VBZ blog-dshr-org-8024 62 21 far far RB blog-dshr-org-8024 62 22 from from IN blog-dshr-org-8024 62 23 fool fool NN blog-dshr-org-8024 62 24 - - HYPH blog-dshr-org-8024 62 25 proof proof NN blog-dshr-org-8024 62 26 . . . blog-dshr-org-8024 63 1 This this DT blog-dshr-org-8024 63 2 lack lack NN blog-dshr-org-8024 63 3 of of IN blog-dshr-org-8024 63 4 trustworthiness trustworthiness NN blog-dshr-org-8024 63 5 of of IN blog-dshr-org-8024 63 6 CAs ca NNS blog-dshr-org-8024 63 7 should should MD blog-dshr-org-8024 63 8 not not RB blog-dshr-org-8024 63 9 be be VB blog-dshr-org-8024 63 10 a a DT blog-dshr-org-8024 63 11 surprise surprise NN blog-dshr-org-8024 63 12 . . . blog-dshr-org-8024 64 1 Six six CD blog-dshr-org-8024 64 2 years year NNS blog-dshr-org-8024 64 3 ago ago RB blog-dshr-org-8024 64 4 Security Security NNP blog-dshr-org-8024 64 5 Collapse Collapse NNP blog-dshr-org-8024 64 6 in in IN blog-dshr-org-8024 64 7 the the DT blog-dshr-org-8024 64 8 HTTPS HTTPS NNP blog-dshr-org-8024 64 9 Market Market NNP blog-dshr-org-8024 64 10 , , , blog-dshr-org-8024 64 11 a a DT blog-dshr-org-8024 64 12 fascinating fascinating JJ blog-dshr-org-8024 64 13 analysis analysis NN blog-dshr-org-8024 64 14 of of IN blog-dshr-org-8024 64 15 the the DT blog-dshr-org-8024 64 16 ( ( -LRB- blog-dshr-org-8024 64 17 lack lack NN blog-dshr-org-8024 64 18 of of IN blog-dshr-org-8024 64 19 ) ) -RRB- blog-dshr-org-8024 64 20 security security NN blog-dshr-org-8024 64 21 on on IN blog-dshr-org-8024 64 22 the the DT blog-dshr-org-8024 64 23 Web web NN blog-dshr-org-8024 64 24 from from IN blog-dshr-org-8024 64 25 an an DT blog-dshr-org-8024 64 26 economic economic JJ blog-dshr-org-8024 64 27 rather rather RB blog-dshr-org-8024 64 28 than than IN blog-dshr-org-8024 64 29 a a DT blog-dshr-org-8024 64 30 technical technical JJ blog-dshr-org-8024 64 31 perspective perspective NN blog-dshr-org-8024 64 32 by by IN blog-dshr-org-8024 64 33 Axel Axel NNP blog-dshr-org-8024 64 34 Arnbak Arnbak NNP blog-dshr-org-8024 64 35 et et FW blog-dshr-org-8024 64 36 al al NNP blog-dshr-org-8024 64 37 from from IN blog-dshr-org-8024 64 38 Amsterdam Amsterdam NNP blog-dshr-org-8024 64 39 and and CC blog-dshr-org-8024 64 40 Delft Delft NNP blog-dshr-org-8024 64 41 Universities Universities NNPS blog-dshr-org-8024 64 42 showed show VBD blog-dshr-org-8024 64 43 that that IN blog-dshr-org-8024 64 44 CAs cas JJ blog-dshr-org-8024 64 45 lack lack NN blog-dshr-org-8024 64 46 incentives incentive NNS blog-dshr-org-8024 64 47 to to TO blog-dshr-org-8024 64 48 be be VB blog-dshr-org-8024 64 49 trustworthy trustworthy JJ blog-dshr-org-8024 64 50 . . . blog-dshr-org-8024 65 1 They -PRON- PRP blog-dshr-org-8024 65 2 write write VBP blog-dshr-org-8024 65 3 : : : blog-dshr-org-8024 65 4 Information information NN blog-dshr-org-8024 65 5 asymmetry asymmetry NN blog-dshr-org-8024 65 6 prevents prevent VBZ blog-dshr-org-8024 65 7 buyers buyer NNS blog-dshr-org-8024 65 8 from from IN blog-dshr-org-8024 65 9 knowing know VBG blog-dshr-org-8024 65 10 what what WP blog-dshr-org-8024 65 11 CAs ca NNS blog-dshr-org-8024 65 12 are be VBP blog-dshr-org-8024 65 13 really really RB blog-dshr-org-8024 65 14 doing do VBG blog-dshr-org-8024 65 15 . . . blog-dshr-org-8024 66 1 Buyers buyer NNS blog-dshr-org-8024 66 2 are be VBP blog-dshr-org-8024 66 3 paying pay VBG blog-dshr-org-8024 66 4 for for IN blog-dshr-org-8024 66 5 the the DT blog-dshr-org-8024 66 6 perception perception NN blog-dshr-org-8024 66 7 of of IN blog-dshr-org-8024 66 8 security security NN blog-dshr-org-8024 66 9 , , , blog-dshr-org-8024 66 10 a a DT blog-dshr-org-8024 66 11 liability liability NN blog-dshr-org-8024 66 12 shield shield NN blog-dshr-org-8024 66 13 , , , blog-dshr-org-8024 66 14 and and CC blog-dshr-org-8024 66 15 trust trust NN blog-dshr-org-8024 66 16 signals signal NNS blog-dshr-org-8024 66 17 to to IN blog-dshr-org-8024 66 18 third third JJ blog-dshr-org-8024 66 19 parties party NNS blog-dshr-org-8024 66 20 . . . blog-dshr-org-8024 67 1 None none NN blog-dshr-org-8024 67 2 of of IN blog-dshr-org-8024 67 3 these these DT blog-dshr-org-8024 67 4 correlates correlate NNS blog-dshr-org-8024 67 5 verifiably verifiably RB blog-dshr-org-8024 67 6 with with IN blog-dshr-org-8024 67 7 actual actual JJ blog-dshr-org-8024 67 8 security security NN blog-dshr-org-8024 67 9 . . . blog-dshr-org-8024 68 1 Given give VBN blog-dshr-org-8024 68 2 that that IN blog-dshr-org-8024 68 3 CA CA NNP blog-dshr-org-8024 68 4 security security NN blog-dshr-org-8024 68 5 is be VBZ blog-dshr-org-8024 68 6 largely largely RB blog-dshr-org-8024 68 7 unobservable unobservable JJ blog-dshr-org-8024 68 8 , , , blog-dshr-org-8024 68 9 buyers buyer NNS blog-dshr-org-8024 68 10 ’ ’ POS blog-dshr-org-8024 68 11 demands demand NNS blog-dshr-org-8024 68 12 for for IN blog-dshr-org-8024 68 13 security security NN blog-dshr-org-8024 68 14 do do VBP blog-dshr-org-8024 68 15 not not RB blog-dshr-org-8024 68 16 necessarily necessarily RB blog-dshr-org-8024 68 17 translate translate VB blog-dshr-org-8024 68 18 into into IN blog-dshr-org-8024 68 19 strong strong JJ blog-dshr-org-8024 68 20 security security NN blog-dshr-org-8024 68 21 incentives incentive NNS blog-dshr-org-8024 68 22 for for IN blog-dshr-org-8024 68 23 CAs ca NNS blog-dshr-org-8024 68 24 . . . blog-dshr-org-8024 69 1 Negative negative JJ blog-dshr-org-8024 69 2 externalities externality NNS blog-dshr-org-8024 69 3 of of IN blog-dshr-org-8024 69 4 the the DT blog-dshr-org-8024 69 5 weakest weak JJS blog-dshr-org-8024 69 6 - - HYPH blog-dshr-org-8024 69 7 link link NN blog-dshr-org-8024 69 8 security security NN blog-dshr-org-8024 69 9 of of IN blog-dshr-org-8024 69 10 the the DT blog-dshr-org-8024 69 11 system system NN blog-dshr-org-8024 69 12 exacerbate exacerbate VB blog-dshr-org-8024 69 13 these these DT blog-dshr-org-8024 69 14 incentive incentive NN blog-dshr-org-8024 69 15 problems problem NNS blog-dshr-org-8024 69 16 . . . blog-dshr-org-8024 70 1 The the DT blog-dshr-org-8024 70 2 failure failure NN blog-dshr-org-8024 70 3 of of IN blog-dshr-org-8024 70 4 a a DT blog-dshr-org-8024 70 5 single single JJ blog-dshr-org-8024 70 6 CA CA NNP blog-dshr-org-8024 70 7 impacts impact VBZ blog-dshr-org-8024 70 8 the the DT blog-dshr-org-8024 70 9 whole whole JJ blog-dshr-org-8024 70 10 ecosystem ecosystem NN blog-dshr-org-8024 70 11 , , , blog-dshr-org-8024 70 12 not not RB blog-dshr-org-8024 70 13 just just RB blog-dshr-org-8024 70 14 that that IN blog-dshr-org-8024 70 15 CA CA NNP blog-dshr-org-8024 70 16 ’s ’s POS blog-dshr-org-8024 70 17 customers customer NNS blog-dshr-org-8024 70 18 . . . blog-dshr-org-8024 71 1 All all DT blog-dshr-org-8024 71 2 other other JJ blog-dshr-org-8024 71 3 things thing NNS blog-dshr-org-8024 71 4 being be VBG blog-dshr-org-8024 71 5 equal equal JJ blog-dshr-org-8024 71 6 , , , blog-dshr-org-8024 71 7 these these DT blog-dshr-org-8024 71 8 interdependencies interdependency NNS blog-dshr-org-8024 71 9 undermine undermine VBP blog-dshr-org-8024 71 10 the the DT blog-dshr-org-8024 71 11 incentives incentive NNS blog-dshr-org-8024 71 12 of of IN blog-dshr-org-8024 71 13 CAs ca NNS blog-dshr-org-8024 71 14 to to TO blog-dshr-org-8024 71 15 invest invest VB blog-dshr-org-8024 71 16 , , , blog-dshr-org-8024 71 17 as as IN blog-dshr-org-8024 71 18 the the DT blog-dshr-org-8024 71 19 security security NN blog-dshr-org-8024 71 20 of of IN blog-dshr-org-8024 71 21 their -PRON- PRP$ blog-dshr-org-8024 71 22 customers customer NNS blog-dshr-org-8024 71 23 depends depend VBZ blog-dshr-org-8024 71 24 on on IN blog-dshr-org-8024 71 25 the the DT blog-dshr-org-8024 71 26 efforts effort NNS blog-dshr-org-8024 71 27 of of IN blog-dshr-org-8024 71 28 all all DT blog-dshr-org-8024 71 29 other other JJ blog-dshr-org-8024 71 30 CAs ca NNS blog-dshr-org-8024 71 31 . . . blog-dshr-org-8024 72 1 The the DT blog-dshr-org-8024 72 2 reason reason NN blog-dshr-org-8024 72 3 for for IN blog-dshr-org-8024 72 4 the the DT blog-dshr-org-8024 72 5 weakest weak JJS blog-dshr-org-8024 72 6 - - HYPH blog-dshr-org-8024 72 7 link link NN blog-dshr-org-8024 72 8 is be VBZ blog-dshr-org-8024 72 9 : : : blog-dshr-org-8024 72 10 A a DT blog-dshr-org-8024 72 11 crucial crucial JJ blog-dshr-org-8024 72 12 technical technical JJ blog-dshr-org-8024 72 13 property property NN blog-dshr-org-8024 72 14 of of IN blog-dshr-org-8024 72 15 the the DT blog-dshr-org-8024 72 16 HTTPS HTTPS NNP blog-dshr-org-8024 72 17 authentication authentication NN blog-dshr-org-8024 72 18 model model NN blog-dshr-org-8024 72 19 is be VBZ blog-dshr-org-8024 72 20 that that IN blog-dshr-org-8024 72 21 any any DT blog-dshr-org-8024 72 22 CA CA NNP blog-dshr-org-8024 72 23 can can MD blog-dshr-org-8024 72 24 sign sign VB blog-dshr-org-8024 72 25 certificates certificate NNS blog-dshr-org-8024 72 26 for for IN blog-dshr-org-8024 72 27 any any DT blog-dshr-org-8024 72 28 domain domain NN blog-dshr-org-8024 72 29 name name NN blog-dshr-org-8024 72 30 . . . blog-dshr-org-8024 73 1 In in IN blog-dshr-org-8024 73 2 other other JJ blog-dshr-org-8024 73 3 words word NNS blog-dshr-org-8024 73 4 , , , blog-dshr-org-8024 73 5 literally literally RB blog-dshr-org-8024 73 6 anyone anyone NN blog-dshr-org-8024 73 7 can can MD blog-dshr-org-8024 73 8 request request VB blog-dshr-org-8024 73 9 a a DT blog-dshr-org-8024 73 10 certificate certificate NN blog-dshr-org-8024 73 11 for for IN blog-dshr-org-8024 73 12 a a DT blog-dshr-org-8024 73 13 Google Google NNP blog-dshr-org-8024 73 14 domain domain NN blog-dshr-org-8024 73 15 at at IN blog-dshr-org-8024 73 16 any any DT blog-dshr-org-8024 73 17 CA CA NNP blog-dshr-org-8024 73 18 anywhere anywhere RB blog-dshr-org-8024 73 19 in in IN blog-dshr-org-8024 73 20 the the DT blog-dshr-org-8024 73 21 world world NN blog-dshr-org-8024 73 22 , , , blog-dshr-org-8024 73 23 even even RB blog-dshr-org-8024 73 24 when when WRB blog-dshr-org-8024 73 25 Google Google NNP blog-dshr-org-8024 73 26 itself -PRON- PRP blog-dshr-org-8024 73 27 has have VBZ blog-dshr-org-8024 73 28 contracted contract VBN blog-dshr-org-8024 73 29 one one CD blog-dshr-org-8024 73 30 particular particular JJ blog-dshr-org-8024 73 31 CA CA NNP blog-dshr-org-8024 73 32 to to TO blog-dshr-org-8024 73 33 sign sign VB blog-dshr-org-8024 73 34 its -PRON- PRP$ blog-dshr-org-8024 73 35 certificate certificate NN blog-dshr-org-8024 73 36 . . . blog-dshr-org-8024 74 1 This this DT blog-dshr-org-8024 74 2 " " `` blog-dshr-org-8024 74 3 technical technical JJ blog-dshr-org-8024 74 4 property property NN blog-dshr-org-8024 74 5 " " '' blog-dshr-org-8024 74 6 is be VBZ blog-dshr-org-8024 74 7 actually actually RB blog-dshr-org-8024 74 8 important important JJ blog-dshr-org-8024 74 9 , , , blog-dshr-org-8024 74 10 it -PRON- PRP blog-dshr-org-8024 74 11 is be VBZ blog-dshr-org-8024 74 12 what what WP blog-dshr-org-8024 74 13 enables enable VBZ blog-dshr-org-8024 74 14 a a DT blog-dshr-org-8024 74 15 competitive competitive JJ blog-dshr-org-8024 74 16 market market NN blog-dshr-org-8024 74 17 of of IN blog-dshr-org-8024 74 18 CAs CAs NNP blog-dshr-org-8024 74 19 . . . blog-dshr-org-8024 75 1 Symantec symantec VB blog-dshr-org-8024 75 2 in in IN blog-dshr-org-8024 75 3 particular particular JJ blog-dshr-org-8024 75 4 has have VBZ blog-dshr-org-8024 75 5 exploited exploit VBN blog-dshr-org-8024 75 6 it -PRON- PRP blog-dshr-org-8024 75 7 wholesale wholesale JJ blog-dshr-org-8024 75 8 : : : blog-dshr-org-8024 75 9 Google Google NNP blog-dshr-org-8024 75 10 's 's POS blog-dshr-org-8024 75 11 investigation investigation NN blog-dshr-org-8024 75 12 revealed reveal VBD blog-dshr-org-8024 75 13 that that IN blog-dshr-org-8024 75 14 over over IN blog-dshr-org-8024 75 15 a a DT blog-dshr-org-8024 75 16 span span NN blog-dshr-org-8024 75 17 of of IN blog-dshr-org-8024 75 18 years year NNS blog-dshr-org-8024 75 19 , , , blog-dshr-org-8024 75 20 Symantec Symantec NNP blog-dshr-org-8024 75 21 CAs ca NNS blog-dshr-org-8024 75 22 have have VBP blog-dshr-org-8024 75 23 improperly improperly RB blog-dshr-org-8024 75 24 issued issue VBN blog-dshr-org-8024 75 25 more more JJR blog-dshr-org-8024 75 26 than than IN blog-dshr-org-8024 75 27 30,000 30,000 CD blog-dshr-org-8024 75 28 certificates certificate NNS blog-dshr-org-8024 75 29 . . . blog-dshr-org-8024 76 1 ... ... NFP blog-dshr-org-8024 77 1 They -PRON- PRP blog-dshr-org-8024 77 2 are be VBP blog-dshr-org-8024 77 3 a a DT blog-dshr-org-8024 77 4 major major JJ blog-dshr-org-8024 77 5 violation violation NN blog-dshr-org-8024 77 6 of of IN blog-dshr-org-8024 77 7 the the DT blog-dshr-org-8024 77 8 so so RB blog-dshr-org-8024 77 9 - - HYPH blog-dshr-org-8024 77 10 called call VBN blog-dshr-org-8024 77 11 baseline baseline NN blog-dshr-org-8024 77 12 requirements requirement NNS blog-dshr-org-8024 77 13 that that IN blog-dshr-org-8024 77 14 major major JJ blog-dshr-org-8024 77 15 browser browser NN blog-dshr-org-8024 77 16 makers maker NNS blog-dshr-org-8024 77 17 impose impose VBP blog-dshr-org-8024 77 18 of of IN blog-dshr-org-8024 77 19 CAs CAs NNP blog-dshr-org-8024 77 20 as as IN blog-dshr-org-8024 77 21 a a DT blog-dshr-org-8024 77 22 condition condition NN blog-dshr-org-8024 77 23 of of IN blog-dshr-org-8024 77 24 being be VBG blog-dshr-org-8024 77 25 trusted trust VBN blog-dshr-org-8024 77 26 by by IN blog-dshr-org-8024 77 27 major major JJ blog-dshr-org-8024 77 28 browsers browser NNS blog-dshr-org-8024 77 29 . . . blog-dshr-org-8024 78 1 But but CC blog-dshr-org-8024 78 2 Symantec Symantec NNP blog-dshr-org-8024 78 3 has have VBZ blog-dshr-org-8024 78 4 suffered suffer VBN blog-dshr-org-8024 78 5 no no DT blog-dshr-org-8024 78 6 effective effective JJ blog-dshr-org-8024 78 7 sanctions sanction NNS blog-dshr-org-8024 78 8 because because IN blog-dshr-org-8024 78 9 they -PRON- PRP blog-dshr-org-8024 78 10 are be VBP blog-dshr-org-8024 78 11 too too RB blog-dshr-org-8024 78 12 big big JJ blog-dshr-org-8024 78 13 to to TO blog-dshr-org-8024 78 14 fail fail VB blog-dshr-org-8024 78 15 : : : blog-dshr-org-8024 78 16 Symantec Symantec NNP blog-dshr-org-8024 78 17 's 's POS blog-dshr-org-8024 78 18 repeated repeated JJ blog-dshr-org-8024 78 19 violations violation NNS blog-dshr-org-8024 78 20 underscore underscore VBP blog-dshr-org-8024 78 21 one one CD blog-dshr-org-8024 78 22 of of IN blog-dshr-org-8024 78 23 the the DT blog-dshr-org-8024 78 24 problems problem NNS blog-dshr-org-8024 78 25 Google Google NNP blog-dshr-org-8024 78 26 and and CC blog-dshr-org-8024 78 27 others other NNS blog-dshr-org-8024 78 28 have have VBP blog-dshr-org-8024 78 29 in in IN blog-dshr-org-8024 78 30 enforcing enforce VBG blog-dshr-org-8024 78 31 terms term NNS blog-dshr-org-8024 78 32 of of IN blog-dshr-org-8024 78 33 the the DT blog-dshr-org-8024 78 34 baseline baseline NN blog-dshr-org-8024 78 35 requirements requirement NNS blog-dshr-org-8024 78 36 . . . blog-dshr-org-8024 79 1 When when WRB blog-dshr-org-8024 79 2 violations violation NNS blog-dshr-org-8024 79 3 are be VBP blog-dshr-org-8024 79 4 carried carry VBN blog-dshr-org-8024 79 5 out out RP blog-dshr-org-8024 79 6 by by IN blog-dshr-org-8024 79 7 issuers issuer NNS blog-dshr-org-8024 79 8 with with IN blog-dshr-org-8024 79 9 a a DT blog-dshr-org-8024 79 10 big big JJ blog-dshr-org-8024 79 11 enough enough JJ blog-dshr-org-8024 79 12 market market NN blog-dshr-org-8024 79 13 share share NN blog-dshr-org-8024 79 14 they -PRON- PRP blog-dshr-org-8024 79 15 're be VBP blog-dshr-org-8024 79 16 considered consider VBN blog-dshr-org-8024 79 17 too too RB blog-dshr-org-8024 79 18 big big JJ blog-dshr-org-8024 79 19 to to TO blog-dshr-org-8024 79 20 fail fail VB blog-dshr-org-8024 79 21 . . . blog-dshr-org-8024 80 1 If if IN blog-dshr-org-8024 80 2 Google Google NNP blog-dshr-org-8024 80 3 were be VBD blog-dshr-org-8024 80 4 to to TO blog-dshr-org-8024 80 5 nullify nullify VB blog-dshr-org-8024 80 6 all all DT blog-dshr-org-8024 80 7 of of IN blog-dshr-org-8024 80 8 the the DT blog-dshr-org-8024 80 9 Symantec Symantec NNP blog-dshr-org-8024 80 10 - - HYPH blog-dshr-org-8024 80 11 issued issue VBN blog-dshr-org-8024 80 12 certificates certificate NNS blog-dshr-org-8024 80 13 overnight overnight RB blog-dshr-org-8024 80 14 , , , blog-dshr-org-8024 80 15 it -PRON- PRP blog-dshr-org-8024 80 16 might may MD blog-dshr-org-8024 80 17 cause cause VB blog-dshr-org-8024 80 18 widespread widespread JJ blog-dshr-org-8024 80 19 outages outage NNS blog-dshr-org-8024 80 20 . . . blog-dshr-org-8024 81 1 My -PRON- PRP$ blog-dshr-org-8024 81 2 Firefox Firefox NNP blog-dshr-org-8024 81 3 still still RB blog-dshr-org-8024 81 4 trusts trust VBZ blog-dshr-org-8024 81 5 Symantec Symantec NNP blog-dshr-org-8024 81 6 root root NN blog-dshr-org-8024 81 7 certificates certificate NNS blog-dshr-org-8024 81 8 . . . blog-dshr-org-8024 82 1 Because because IN blog-dshr-org-8024 82 2 Google Google NNP blog-dshr-org-8024 82 3 , , , blog-dshr-org-8024 82 4 Mozilla Mozilla NNP blog-dshr-org-8024 82 5 and and CC blog-dshr-org-8024 82 6 others other NNS blog-dshr-org-8024 82 7 prioritize prioritize VBP blog-dshr-org-8024 82 8 keeping keep VBG blog-dshr-org-8024 82 9 the the DT blog-dshr-org-8024 82 10 Web web NN blog-dshr-org-8024 82 11 working work VBG blog-dshr-org-8024 82 12 over over IN blog-dshr-org-8024 82 13 keeping keep VBG blog-dshr-org-8024 82 14 it -PRON- PRP blog-dshr-org-8024 82 15 secure secure JJ blog-dshr-org-8024 82 16 , , , blog-dshr-org-8024 82 17 deleting delete VBG blog-dshr-org-8024 82 18 misbehaving misbehave VBG blog-dshr-org-8024 82 19 big big JJ blog-dshr-org-8024 82 20 CAs ca NNS blog-dshr-org-8024 82 21 from from IN blog-dshr-org-8024 82 22 trust trust NN blog-dshr-org-8024 82 23 lists list NNS blog-dshr-org-8024 82 24 wo will MD blog-dshr-org-8024 82 25 n't not RB blog-dshr-org-8024 82 26 happen happen VB blog-dshr-org-8024 82 27 . . . blog-dshr-org-8024 83 1 When when WRB blog-dshr-org-8024 83 2 Mozilla Mozilla NNP blog-dshr-org-8024 83 3 writes write VBZ blog-dshr-org-8024 83 4 : : : blog-dshr-org-8024 83 5 You -PRON- PRP blog-dshr-org-8024 83 6 are be VBP blog-dshr-org-8024 83 7 definitely definitely RB blog-dshr-org-8024 83 8 connected connected JJ blog-dshr-org-8024 83 9 to to IN blog-dshr-org-8024 83 10 the the DT blog-dshr-org-8024 83 11 website website NN blog-dshr-org-8024 83 12 whose whose WP$ blog-dshr-org-8024 83 13 address address NN blog-dshr-org-8024 83 14 is be VBZ blog-dshr-org-8024 83 15 shown show VBN blog-dshr-org-8024 83 16 in in IN blog-dshr-org-8024 83 17 the the DT blog-dshr-org-8024 83 18 address address NN blog-dshr-org-8024 83 19 bar bar NN blog-dshr-org-8024 83 20 ; ; : blog-dshr-org-8024 83 21 the the DT blog-dshr-org-8024 83 22 connection connection NN blog-dshr-org-8024 83 23 has have VBZ blog-dshr-org-8024 83 24 not not RB blog-dshr-org-8024 83 25 been be VBN blog-dshr-org-8024 83 26 intercepted intercept VBN blog-dshr-org-8024 83 27 . . . blog-dshr-org-8024 84 1 they -PRON- PRP blog-dshr-org-8024 84 2 are be VBP blog-dshr-org-8024 84 3 assuming assume VBG blog-dshr-org-8024 84 4 a a DT blog-dshr-org-8024 84 5 world world NN blog-dshr-org-8024 84 6 of of IN blog-dshr-org-8024 84 7 honest honest JJ blog-dshr-org-8024 84 8 CAs ca NNS blog-dshr-org-8024 84 9 that that WDT blog-dshr-org-8024 84 10 is be VBZ blog-dshr-org-8024 84 11 n't not RB blog-dshr-org-8024 84 12 this this DT blog-dshr-org-8024 84 13 world world NN blog-dshr-org-8024 84 14 . . . blog-dshr-org-8024 85 1 If if IN blog-dshr-org-8024 85 2 you -PRON- PRP blog-dshr-org-8024 85 3 have have VBP blog-dshr-org-8024 85 4 the the DT blog-dshr-org-8024 85 5 locked lock VBN blog-dshr-org-8024 85 6 padlock padlock NN blog-dshr-org-8024 85 7 icon icon NN blog-dshr-org-8024 85 8 in in IN blog-dshr-org-8024 85 9 your -PRON- PRP$ blog-dshr-org-8024 85 10 URL url NN blog-dshr-org-8024 85 11 bar bar NN blog-dshr-org-8024 85 12 , , , blog-dshr-org-8024 85 13 you -PRON- PRP blog-dshr-org-8024 85 14 are be VBP blog-dshr-org-8024 85 15 probably probably RB blog-dshr-org-8024 85 16 talking talk VBG blog-dshr-org-8024 85 17 to to IN blog-dshr-org-8024 85 18 the the DT blog-dshr-org-8024 85 19 right right JJ blog-dshr-org-8024 85 20 Web web NN blog-dshr-org-8024 85 21 site site NN blog-dshr-org-8024 85 22 , , , blog-dshr-org-8024 85 23 but but CC blog-dshr-org-8024 85 24 there there EX blog-dshr-org-8024 85 25 is be VBZ blog-dshr-org-8024 85 26 a a DT blog-dshr-org-8024 85 27 chance chance NN blog-dshr-org-8024 85 28 you -PRON- PRP blog-dshr-org-8024 85 29 are be VBP blog-dshr-org-8024 85 30 n't not RB blog-dshr-org-8024 85 31 . . . blog-dshr-org-8024 86 1 [ [ -LRB- blog-dshr-org-8024 86 2 Slide slide NN blog-dshr-org-8024 86 3 5 5 CD blog-dshr-org-8024 86 4 ] ] -RRB- blog-dshr-org-8024 86 5 Recent recent JJ blog-dshr-org-8024 86 6 data datum NNS blog-dshr-org-8024 86 7 from from IN blog-dshr-org-8024 86 8 anti anti JJ blog-dshr-org-8024 86 9 - - JJ blog-dshr-org-8024 86 10 phishing phishing JJ blog-dshr-org-8024 86 11 company company NN blog-dshr-org-8024 86 12 PhishLabs PhishLabs NNP blog-dshr-org-8024 86 13 shows show VBZ blog-dshr-org-8024 86 14 that that IN blog-dshr-org-8024 86 15 49 49 CD blog-dshr-org-8024 86 16 percent percent NN blog-dshr-org-8024 86 17 of of IN blog-dshr-org-8024 86 18 all all DT blog-dshr-org-8024 86 19 phishing phishe VBG blog-dshr-org-8024 86 20 sites site NNS blog-dshr-org-8024 86 21 in in IN blog-dshr-org-8024 86 22 the the DT blog-dshr-org-8024 86 23 third third JJ blog-dshr-org-8024 86 24 quarter quarter NN blog-dshr-org-8024 86 25 of of IN blog-dshr-org-8024 86 26 2018 2018 CD blog-dshr-org-8024 86 27 bore bear VBD blog-dshr-org-8024 86 28 the the DT blog-dshr-org-8024 86 29 padlock padlock NNP blog-dshr-org-8024 86 30 security security NN blog-dshr-org-8024 86 31 icon icon NN blog-dshr-org-8024 86 32 next next RB blog-dshr-org-8024 86 33 to to IN blog-dshr-org-8024 86 34 the the DT blog-dshr-org-8024 86 35 phishing phishe VBG blog-dshr-org-8024 86 36 site site NN blog-dshr-org-8024 86 37 domain domain NN blog-dshr-org-8024 86 38 name name NN blog-dshr-org-8024 86 39 as as IN blog-dshr-org-8024 86 40 displayed display VBN blog-dshr-org-8024 86 41 in in IN blog-dshr-org-8024 86 42 a a DT blog-dshr-org-8024 86 43 browser browser NN blog-dshr-org-8024 86 44 address address NN blog-dshr-org-8024 86 45 bar bar NN blog-dshr-org-8024 86 46 . . . blog-dshr-org-8024 87 1 That that DT blog-dshr-org-8024 87 2 ’s ’ VBZ blog-dshr-org-8024 87 3 up up RB blog-dshr-org-8024 87 4 from from IN blog-dshr-org-8024 87 5 25 25 CD blog-dshr-org-8024 87 6 percent percent NN blog-dshr-org-8024 87 7 just just RB blog-dshr-org-8024 87 8 one one CD blog-dshr-org-8024 87 9 year year NN blog-dshr-org-8024 87 10 ago ago RB blog-dshr-org-8024 87 11 , , , blog-dshr-org-8024 87 12 and and CC blog-dshr-org-8024 87 13 from from IN blog-dshr-org-8024 87 14 35 35 CD blog-dshr-org-8024 87 15 percent percent NN blog-dshr-org-8024 87 16 in in IN blog-dshr-org-8024 87 17 the the DT blog-dshr-org-8024 87 18 second second JJ blog-dshr-org-8024 87 19 quarter quarter NN blog-dshr-org-8024 87 20 of of IN blog-dshr-org-8024 87 21 2018 2018 CD blog-dshr-org-8024 87 22 . . . blog-dshr-org-8024 88 1 Brian Brian NNP blog-dshr-org-8024 88 2 Krebs Krebs NNP blog-dshr-org-8024 88 3 Half Half NNP blog-dshr-org-8024 88 4 of of IN blog-dshr-org-8024 88 5 all all DT blog-dshr-org-8024 88 6 Phishing phishe VBG blog-dshr-org-8024 88 7 Sites Sites NNPS blog-dshr-org-8024 88 8 Now now RB blog-dshr-org-8024 88 9 Have have VBP blog-dshr-org-8024 88 10 the the DT blog-dshr-org-8024 88 11 Padlock Padlock NNP blog-dshr-org-8024 88 12 Building Building NNP blog-dshr-org-8024 88 13 on on IN blog-dshr-org-8024 88 14 earlier early JJR blog-dshr-org-8024 88 15 work work NN blog-dshr-org-8024 88 16 by by IN blog-dshr-org-8024 88 17 Wendlandt Wendlandt NNP blog-dshr-org-8024 88 18 et et NNP blog-dshr-org-8024 88 19 al al NNP blog-dshr-org-8024 88 20 , , , blog-dshr-org-8024 88 21 Moxie Moxie NNP blog-dshr-org-8024 88 22 Marlinspike Marlinspike NNP blog-dshr-org-8024 88 23 , , , blog-dshr-org-8024 88 24 the the DT blog-dshr-org-8024 88 25 EFF eff NN blog-dshr-org-8024 88 26 and and CC blog-dshr-org-8024 88 27 others other NNS blog-dshr-org-8024 88 28 , , , blog-dshr-org-8024 88 29 in in IN blog-dshr-org-8024 88 30 2012 2012 CD blog-dshr-org-8024 88 31 Google Google NNP blog-dshr-org-8024 88 32 started start VBD blog-dshr-org-8024 88 33 work work NN blog-dshr-org-8024 88 34 on on IN blog-dshr-org-8024 88 35 an an DT blog-dshr-org-8024 88 36 approach approach NN blog-dshr-org-8024 88 37 specified specify VBN blog-dshr-org-8024 88 38 in in IN blog-dshr-org-8024 88 39 RFC6962 RFC6962 NNP blog-dshr-org-8024 88 40 , , , blog-dshr-org-8024 88 41 and and CC blog-dshr-org-8024 88 42 called call VBD blog-dshr-org-8024 88 43 Certificate Certificate NNP blog-dshr-org-8024 88 44 Transparency Transparency NNP blog-dshr-org-8024 88 45 ( ( -LRB- blog-dshr-org-8024 88 46 CT CT NNP blog-dshr-org-8024 88 47 ) ) -RRB- blog-dshr-org-8024 88 48 . . . blog-dshr-org-8024 89 1 The the DT blog-dshr-org-8024 89 2 big big JJ blog-dshr-org-8024 89 3 difference difference NN blog-dshr-org-8024 89 4 from from IN blog-dshr-org-8024 89 5 earlier early JJR blog-dshr-org-8024 89 6 efforts effort NNS blog-dshr-org-8024 89 7 , , , blog-dshr-org-8024 89 8 which which WDT blog-dshr-org-8024 89 9 did do VBD blog-dshr-org-8024 89 10 n't not RB blog-dshr-org-8024 89 11 require require VB blog-dshr-org-8024 89 12 cooperation cooperation NN blog-dshr-org-8024 89 13 from from IN blog-dshr-org-8024 89 14 website website NN blog-dshr-org-8024 89 15 owners owner NNS blog-dshr-org-8024 89 16 and and CC blog-dshr-org-8024 89 17 CAs ca NNS blog-dshr-org-8024 89 18 , , , blog-dshr-org-8024 89 19 was be VBD blog-dshr-org-8024 89 20 that that IN blog-dshr-org-8024 89 21 Google Google NNP blog-dshr-org-8024 89 22 's 's POS blog-dshr-org-8024 89 23 did do VBD blog-dshr-org-8024 89 24 require require VB blog-dshr-org-8024 89 25 cooperation cooperation NN blog-dshr-org-8024 89 26 and and CC blog-dshr-org-8024 89 27 they -PRON- PRP blog-dshr-org-8024 89 28 had have VBD blog-dshr-org-8024 89 29 enough enough JJ blog-dshr-org-8024 89 30 leverage leverage NN blog-dshr-org-8024 89 31 to to TO blog-dshr-org-8024 89 32 obtain obtain VB blog-dshr-org-8024 89 33 it -PRON- PRP blog-dshr-org-8024 89 34 : : : blog-dshr-org-8024 89 35 [ [ -LRB- blog-dshr-org-8024 89 36 Slide slide NN blog-dshr-org-8024 89 37 6 6 CD blog-dshr-org-8024 89 38 ] ] -RRB- blog-dshr-org-8024 89 39 Google Google NNP blog-dshr-org-8024 89 40 's 's POS blog-dshr-org-8024 89 41 Certificate Certificate NNP blog-dshr-org-8024 89 42 Transparency Transparency NNP blog-dshr-org-8024 89 43 project project NN blog-dshr-org-8024 89 44 fixes fix VBZ blog-dshr-org-8024 89 45 several several JJ blog-dshr-org-8024 89 46 structural structural JJ blog-dshr-org-8024 89 47 flaws flaw NNS blog-dshr-org-8024 89 48 in in IN blog-dshr-org-8024 89 49 the the DT blog-dshr-org-8024 89 50 SSL SSL NNP blog-dshr-org-8024 89 51 certificate certificate NN blog-dshr-org-8024 89 52 system system NN blog-dshr-org-8024 89 53 , , , blog-dshr-org-8024 89 54 which which WDT blog-dshr-org-8024 89 55 is be VBZ blog-dshr-org-8024 89 56 the the DT blog-dshr-org-8024 89 57 main main JJ blog-dshr-org-8024 89 58 cryptographic cryptographic JJ blog-dshr-org-8024 89 59 system system NN blog-dshr-org-8024 89 60 that that WDT blog-dshr-org-8024 89 61 underlies underlie VBZ blog-dshr-org-8024 89 62 all all DT blog-dshr-org-8024 89 63 HTTPS HTTPS NNP blog-dshr-org-8024 89 64 connections connection NNS blog-dshr-org-8024 89 65 . . . blog-dshr-org-8024 90 1 These these DT blog-dshr-org-8024 90 2 flaws flaw NNS blog-dshr-org-8024 90 3 weaken weaken VBP blog-dshr-org-8024 90 4 the the DT blog-dshr-org-8024 90 5 reliability reliability NN blog-dshr-org-8024 90 6 and and CC blog-dshr-org-8024 90 7 effectiveness effectiveness NN blog-dshr-org-8024 90 8 of of IN blog-dshr-org-8024 90 9 encrypted encrypt VBN blog-dshr-org-8024 90 10 Internet internet NN blog-dshr-org-8024 90 11 connections connection NNS blog-dshr-org-8024 90 12 and and CC blog-dshr-org-8024 90 13 can can MD blog-dshr-org-8024 90 14 compromise compromise VB blog-dshr-org-8024 90 15 critical critical JJ blog-dshr-org-8024 90 16 TLS TLS NNP blog-dshr-org-8024 90 17 / / SYM blog-dshr-org-8024 90 18 SSL SSL NNP blog-dshr-org-8024 90 19 mechanisms mechanism NNS blog-dshr-org-8024 90 20 , , , blog-dshr-org-8024 90 21 including include VBG blog-dshr-org-8024 90 22 domain domain NN blog-dshr-org-8024 90 23 validation validation NN blog-dshr-org-8024 90 24 , , , blog-dshr-org-8024 90 25 end end NN blog-dshr-org-8024 90 26 - - HYPH blog-dshr-org-8024 90 27 to to IN blog-dshr-org-8024 90 28 - - HYPH blog-dshr-org-8024 90 29 end end NN blog-dshr-org-8024 90 30 encryption encryption NN blog-dshr-org-8024 90 31 , , , blog-dshr-org-8024 90 32 and and CC blog-dshr-org-8024 90 33 the the DT blog-dshr-org-8024 90 34 chains chain NNS blog-dshr-org-8024 90 35 of of IN blog-dshr-org-8024 90 36 trust trust NN blog-dshr-org-8024 90 37 set set VBN blog-dshr-org-8024 90 38 up up RP blog-dshr-org-8024 90 39 by by IN blog-dshr-org-8024 90 40 certificate certificate NN blog-dshr-org-8024 90 41 authorities authority NNS blog-dshr-org-8024 90 42 . . . blog-dshr-org-8024 91 1 If if IN blog-dshr-org-8024 91 2 left left JJ blog-dshr-org-8024 91 3 unchecked unchecked JJ blog-dshr-org-8024 91 4 , , , blog-dshr-org-8024 91 5 these these DT blog-dshr-org-8024 91 6 flaws flaw NNS blog-dshr-org-8024 91 7 can can MD blog-dshr-org-8024 91 8 facilitate facilitate VB blog-dshr-org-8024 91 9 a a DT blog-dshr-org-8024 91 10 wide wide JJ blog-dshr-org-8024 91 11 range range NN blog-dshr-org-8024 91 12 of of IN blog-dshr-org-8024 91 13 security security NN blog-dshr-org-8024 91 14 attacks attack NNS blog-dshr-org-8024 91 15 , , , blog-dshr-org-8024 91 16 such such JJ blog-dshr-org-8024 91 17 as as IN blog-dshr-org-8024 91 18 website website NN blog-dshr-org-8024 91 19 spoofing spoofing NN blog-dshr-org-8024 91 20 , , , blog-dshr-org-8024 91 21 server server NN blog-dshr-org-8024 91 22 impersonation impersonation NN blog-dshr-org-8024 91 23 , , , blog-dshr-org-8024 91 24 and and CC blog-dshr-org-8024 91 25 man man NN blog-dshr-org-8024 91 26 - - HYPH blog-dshr-org-8024 91 27 in in IN blog-dshr-org-8024 91 28 - - HYPH blog-dshr-org-8024 91 29 the the DT blog-dshr-org-8024 91 30 - - HYPH blog-dshr-org-8024 91 31 middle middle JJ blog-dshr-org-8024 91 32 attacks attack NNS blog-dshr-org-8024 91 33 . . . blog-dshr-org-8024 92 1 Certificate Certificate NNP blog-dshr-org-8024 92 2 Transparency Transparency NNP blog-dshr-org-8024 92 3 helps help VBZ blog-dshr-org-8024 92 4 eliminate eliminate VB blog-dshr-org-8024 92 5 these these DT blog-dshr-org-8024 92 6 flaws flaw NNS blog-dshr-org-8024 92 7 by by IN blog-dshr-org-8024 92 8 providing provide VBG blog-dshr-org-8024 92 9 an an DT blog-dshr-org-8024 92 10 open open JJ blog-dshr-org-8024 92 11 framework framework NN blog-dshr-org-8024 92 12 for for IN blog-dshr-org-8024 92 13 monitoring monitoring NN blog-dshr-org-8024 92 14 and and CC blog-dshr-org-8024 92 15 auditing audit VBG blog-dshr-org-8024 92 16 SSL SSL NNP blog-dshr-org-8024 92 17 certificates certificate NNS blog-dshr-org-8024 92 18 in in IN blog-dshr-org-8024 92 19 nearly nearly RB blog-dshr-org-8024 92 20 real real JJ blog-dshr-org-8024 92 21 time time NN blog-dshr-org-8024 92 22 . . . blog-dshr-org-8024 93 1 Specifically specifically RB blog-dshr-org-8024 93 2 , , , blog-dshr-org-8024 93 3 Certificate Certificate NNP blog-dshr-org-8024 93 4 Transparency Transparency NNP blog-dshr-org-8024 93 5 makes make VBZ blog-dshr-org-8024 93 6 it -PRON- PRP blog-dshr-org-8024 93 7 possible possible JJ blog-dshr-org-8024 93 8 to to TO blog-dshr-org-8024 93 9 detect detect VB blog-dshr-org-8024 93 10 SSL SSL NNP blog-dshr-org-8024 93 11 certificates certificate NNS blog-dshr-org-8024 93 12 that that WDT blog-dshr-org-8024 93 13 have have VBP blog-dshr-org-8024 93 14 been be VBN blog-dshr-org-8024 93 15 mistakenly mistakenly RB blog-dshr-org-8024 93 16 issued issue VBN blog-dshr-org-8024 93 17 by by IN blog-dshr-org-8024 93 18 a a DT blog-dshr-org-8024 93 19 certificate certificate NN blog-dshr-org-8024 93 20 authority authority NN blog-dshr-org-8024 93 21 or or CC blog-dshr-org-8024 93 22 maliciously maliciously RB blog-dshr-org-8024 93 23 acquired acquire VBN blog-dshr-org-8024 93 24 from from IN blog-dshr-org-8024 93 25 an an DT blog-dshr-org-8024 93 26 otherwise otherwise RB blog-dshr-org-8024 93 27 unimpeachable unimpeachable JJ blog-dshr-org-8024 93 28 certificate certificate NN blog-dshr-org-8024 93 29 authority authority NN blog-dshr-org-8024 93 30 . . . blog-dshr-org-8024 94 1 It -PRON- PRP blog-dshr-org-8024 94 2 also also RB blog-dshr-org-8024 94 3 makes make VBZ blog-dshr-org-8024 94 4 it -PRON- PRP blog-dshr-org-8024 94 5 possible possible JJ blog-dshr-org-8024 94 6 to to TO blog-dshr-org-8024 94 7 identify identify VB blog-dshr-org-8024 94 8 certificate certificate NN blog-dshr-org-8024 94 9 authorities authority NNS blog-dshr-org-8024 94 10 that that WDT blog-dshr-org-8024 94 11 have have VBP blog-dshr-org-8024 94 12 gone go VBN blog-dshr-org-8024 94 13 rogue rogue JJ blog-dshr-org-8024 94 14 and and CC blog-dshr-org-8024 94 15 are be VBP blog-dshr-org-8024 94 16 maliciously maliciously RB blog-dshr-org-8024 94 17 issuing issue VBG blog-dshr-org-8024 94 18 certificates certificate NNS blog-dshr-org-8024 94 19 . . . blog-dshr-org-8024 95 1 Certificate Certificate NNP blog-dshr-org-8024 95 2 Transparency Transparency NNP blog-dshr-org-8024 95 3 The the DT blog-dshr-org-8024 95 4 basic basic JJ blog-dshr-org-8024 95 5 idea idea NN blog-dshr-org-8024 95 6 is be VBZ blog-dshr-org-8024 95 7 to to TO blog-dshr-org-8024 95 8 accompany accompany VB blog-dshr-org-8024 95 9 the the DT blog-dshr-org-8024 95 10 certificate certificate NN blog-dshr-org-8024 95 11 with with IN blog-dshr-org-8024 95 12 a a DT blog-dshr-org-8024 95 13 hash hash NN blog-dshr-org-8024 95 14 of of IN blog-dshr-org-8024 95 15 the the DT blog-dshr-org-8024 95 16 certificate certificate NN blog-dshr-org-8024 95 17 signed sign VBN blog-dshr-org-8024 95 18 by by IN blog-dshr-org-8024 95 19 a a DT blog-dshr-org-8024 95 20 trusted trust VBN blog-dshr-org-8024 95 21 third third JJ blog-dshr-org-8024 95 22 party party NN blog-dshr-org-8024 95 23 , , , blog-dshr-org-8024 95 24 attesting attest VBG blog-dshr-org-8024 95 25 that that IN blog-dshr-org-8024 95 26 the the DT blog-dshr-org-8024 95 27 certificate certificate NN blog-dshr-org-8024 95 28 holder holder NN blog-dshr-org-8024 95 29 told tell VBD blog-dshr-org-8024 95 30 the the DT blog-dshr-org-8024 95 31 third third JJ blog-dshr-org-8024 95 32 party party NN blog-dshr-org-8024 95 33 that that WDT blog-dshr-org-8024 95 34 the the DT blog-dshr-org-8024 95 35 certificate certificate NN blog-dshr-org-8024 95 36 with with IN blog-dshr-org-8024 95 37 that that DT blog-dshr-org-8024 95 38 hash hash NN blog-dshr-org-8024 95 39 was be VBD blog-dshr-org-8024 95 40 current current JJ blog-dshr-org-8024 95 41 . . . blog-dshr-org-8024 96 1 Thus thus RB blog-dshr-org-8024 96 2 in in IN blog-dshr-org-8024 96 3 order order NN blog-dshr-org-8024 96 4 to to TO blog-dshr-org-8024 96 5 spoof spoof VB blog-dshr-org-8024 96 6 a a DT blog-dshr-org-8024 96 7 service service NN blog-dshr-org-8024 96 8 , , , blog-dshr-org-8024 96 9 an an DT blog-dshr-org-8024 96 10 attacker attacker NN blog-dshr-org-8024 96 11 would would MD blog-dshr-org-8024 96 12 have have VB blog-dshr-org-8024 96 13 to to TO blog-dshr-org-8024 96 14 both both DT blog-dshr-org-8024 96 15 obtain obtain VB blog-dshr-org-8024 96 16 a a DT blog-dshr-org-8024 96 17 fraudulent fraudulent JJ blog-dshr-org-8024 96 18 certificate certificate NN blog-dshr-org-8024 96 19 from from IN blog-dshr-org-8024 96 20 a a DT blog-dshr-org-8024 96 21 CA CA NNP blog-dshr-org-8024 96 22 , , , blog-dshr-org-8024 96 23 and and CC blog-dshr-org-8024 96 24 somehow somehow RB blog-dshr-org-8024 96 25 persuade persuade VB blog-dshr-org-8024 96 26 the the DT blog-dshr-org-8024 96 27 third third JJ blog-dshr-org-8024 96 28 party party NNP blog-dshr-org-8024 96 29 to to TO blog-dshr-org-8024 96 30 sign sign VB blog-dshr-org-8024 96 31 a a DT blog-dshr-org-8024 96 32 statement statement NN blog-dshr-org-8024 96 33 that that IN blog-dshr-org-8024 96 34 the the DT blog-dshr-org-8024 96 35 service service NN blog-dshr-org-8024 96 36 had have VBD blog-dshr-org-8024 96 37 told tell VBD blog-dshr-org-8024 96 38 them -PRON- PRP blog-dshr-org-8024 96 39 the the DT blog-dshr-org-8024 96 40 fraudulent fraudulent JJ blog-dshr-org-8024 96 41 certificate certificate NN blog-dshr-org-8024 96 42 was be VBD blog-dshr-org-8024 96 43 current current JJ blog-dshr-org-8024 96 44 . . . blog-dshr-org-8024 97 1 Clearly clearly RB blog-dshr-org-8024 97 2 this this DT blog-dshr-org-8024 97 3 is be VBZ blog-dshr-org-8024 97 4 : : : blog-dshr-org-8024 97 5 more more RBR blog-dshr-org-8024 97 6 secure secure JJ blog-dshr-org-8024 97 7 than than IN blog-dshr-org-8024 97 8 the the DT blog-dshr-org-8024 97 9 current current JJ blog-dshr-org-8024 97 10 situation situation NN blog-dshr-org-8024 97 11 , , , blog-dshr-org-8024 97 12 which which WDT blog-dshr-org-8024 97 13 requires require VBZ blog-dshr-org-8024 97 14 only only RB blog-dshr-org-8024 97 15 compromising compromise VBG blog-dshr-org-8024 97 16 a a DT blog-dshr-org-8024 97 17 CA CA NNP blog-dshr-org-8024 97 18 , , , blog-dshr-org-8024 97 19 and and CC blog-dshr-org-8024 97 20 : : : blog-dshr-org-8024 97 21 more more RBR blog-dshr-org-8024 97 22 effective effective JJ blog-dshr-org-8024 97 23 than than IN blog-dshr-org-8024 97 24 client client NN blog-dshr-org-8024 97 25 - - HYPH blog-dshr-org-8024 97 26 only only JJ blog-dshr-org-8024 97 27 approaches approach NNS blog-dshr-org-8024 97 28 , , , blog-dshr-org-8024 97 29 which which WDT blog-dshr-org-8024 97 30 can can MD blog-dshr-org-8024 97 31 detect detect VB blog-dshr-org-8024 97 32 that that IN blog-dshr-org-8024 97 33 a a DT blog-dshr-org-8024 97 34 certificate certificate NN blog-dshr-org-8024 97 35 has have VBZ blog-dshr-org-8024 97 36 changed change VBN blog-dshr-org-8024 97 37 but but CC blog-dshr-org-8024 97 38 not not RB blog-dshr-org-8024 97 39 whether whether IN blog-dshr-org-8024 97 40 the the DT blog-dshr-org-8024 97 41 change change NN blog-dshr-org-8024 97 42 was be VBD blog-dshr-org-8024 97 43 authorized authorize VBN blog-dshr-org-8024 97 44 . . . blog-dshr-org-8024 98 1 CT CT NNP blog-dshr-org-8024 98 2 also also RB blog-dshr-org-8024 98 3 requires require VBZ blog-dshr-org-8024 98 4 participation participation NN blog-dshr-org-8024 98 5 from from IN blog-dshr-org-8024 98 6 browser browser NN blog-dshr-org-8024 98 7 manufacturers manufacturer NNS blog-dshr-org-8024 98 8 : : . blog-dshr-org-8024 98 9 In in IN blog-dshr-org-8024 98 10 order order NN blog-dshr-org-8024 98 11 to to TO blog-dshr-org-8024 98 12 improve improve VB blog-dshr-org-8024 98 13 the the DT blog-dshr-org-8024 98 14 security security NN blog-dshr-org-8024 98 15 of of IN blog-dshr-org-8024 98 16 Extended extended JJ blog-dshr-org-8024 98 17 Validation Validation NNP blog-dshr-org-8024 98 18 ( ( -LRB- blog-dshr-org-8024 98 19 EV EV NNP blog-dshr-org-8024 98 20 ) ) -RRB- blog-dshr-org-8024 98 21 certificates certificate NNS blog-dshr-org-8024 98 22 , , , blog-dshr-org-8024 98 23 Google Google NNP blog-dshr-org-8024 98 24 Chrome Chrome NNP blog-dshr-org-8024 98 25 requires require VBZ blog-dshr-org-8024 98 26 Certificate Certificate NNP blog-dshr-org-8024 98 27 Transparency Transparency NNP blog-dshr-org-8024 98 28 ( ( -LRB- blog-dshr-org-8024 98 29 CT CT NNP blog-dshr-org-8024 98 30 ) ) -RRB- blog-dshr-org-8024 98 31 compliance compliance NN blog-dshr-org-8024 98 32 for for IN blog-dshr-org-8024 98 33 all all DT blog-dshr-org-8024 98 34 EV EV NNP blog-dshr-org-8024 98 35 certificates certificate NNS blog-dshr-org-8024 98 36 issued issue VBN blog-dshr-org-8024 98 37 after after IN blog-dshr-org-8024 98 38 1 1 CD blog-dshr-org-8024 98 39 Jan Jan NNP blog-dshr-org-8024 98 40 2015 2015 CD blog-dshr-org-8024 98 41 . . . blog-dshr-org-8024 99 1 Clients client NNS blog-dshr-org-8024 99 2 now now RB blog-dshr-org-8024 99 3 need need VBP blog-dshr-org-8024 99 4 two two CD blog-dshr-org-8024 99 5 lists list NNS blog-dshr-org-8024 99 6 of of IN blog-dshr-org-8024 99 7 trusted trust VBN blog-dshr-org-8024 99 8 third third JJ blog-dshr-org-8024 99 9 parties party NNS blog-dshr-org-8024 99 10 , , , blog-dshr-org-8024 99 11 the the DT blog-dshr-org-8024 99 12 CAs ca NNS blog-dshr-org-8024 99 13 and and CC blog-dshr-org-8024 99 14 the the DT blog-dshr-org-8024 99 15 sources source NNS blog-dshr-org-8024 99 16 of of IN blog-dshr-org-8024 99 17 CT CT NNP blog-dshr-org-8024 99 18 attestations attestation NNS blog-dshr-org-8024 99 19 . . . blog-dshr-org-8024 100 1 The the DT blog-dshr-org-8024 100 2 need need NN blog-dshr-org-8024 100 3 for for IN blog-dshr-org-8024 100 4 these these DT blog-dshr-org-8024 100 5 trusted trust VBN blog-dshr-org-8024 100 6 third third JJ blog-dshr-org-8024 100 7 parties party NNS blog-dshr-org-8024 100 8 is be VBZ blog-dshr-org-8024 100 9 where where WRB blog-dshr-org-8024 100 10 the the DT blog-dshr-org-8024 100 11 blockchain blockchain JJ blog-dshr-org-8024 100 12 enthusiasts enthusiast NNS blog-dshr-org-8024 100 13 would would MD blog-dshr-org-8024 100 14 jump jump VB blog-dshr-org-8024 100 15 in in RP blog-dshr-org-8024 100 16 and and CC blog-dshr-org-8024 100 17 claim claim NN blog-dshr-org-8024 100 18 ( ( -LRB- blog-dshr-org-8024 100 19 falsely falsely RB blog-dshr-org-8024 100 20 ) ) -RRB- blog-dshr-org-8024 100 21 that that IN blog-dshr-org-8024 100 22 using use VBG blog-dshr-org-8024 100 23 a a DT blog-dshr-org-8024 100 24 blockchain blockchain NN blog-dshr-org-8024 100 25 would would MD blog-dshr-org-8024 100 26 eliminate eliminate VB blog-dshr-org-8024 100 27 the the DT blog-dshr-org-8024 100 28 need need NN blog-dshr-org-8024 100 29 for for IN blog-dshr-org-8024 100 30 trust trust NN blog-dshr-org-8024 100 31 . . . blog-dshr-org-8024 101 1 But but CC blog-dshr-org-8024 101 2 CT CT NNP blog-dshr-org-8024 101 3 has have VBZ blog-dshr-org-8024 101 4 a a DT blog-dshr-org-8024 101 5 much much RB blog-dshr-org-8024 101 6 more more RBR blog-dshr-org-8024 101 7 sophisticated sophisticated JJ blog-dshr-org-8024 101 8 approach approach NN blog-dshr-org-8024 101 9 , , , blog-dshr-org-8024 101 10 Ronald Ronald NNP blog-dshr-org-8024 101 11 Reagan Reagan NNP blog-dshr-org-8024 101 12 's 's POS blog-dshr-org-8024 101 13 " " `` blog-dshr-org-8024 101 14 Trust Trust NNP blog-dshr-org-8024 101 15 , , , blog-dshr-org-8024 101 16 but but CC blog-dshr-org-8024 101 17 Verify Verify NNP blog-dshr-org-8024 101 18 " " '' blog-dshr-org-8024 101 19 . . . blog-dshr-org-8024 102 1 In in IN blog-dshr-org-8024 102 2 the the DT blog-dshr-org-8024 102 3 real real JJ blog-dshr-org-8024 102 4 world world NN blog-dshr-org-8024 102 5 it -PRON- PRP blog-dshr-org-8024 102 6 is be VBZ blog-dshr-org-8024 102 7 n't not RB blog-dshr-org-8024 102 8 feasible feasible JJ blog-dshr-org-8024 102 9 to to TO blog-dshr-org-8024 102 10 solve solve VB blog-dshr-org-8024 102 11 the the DT blog-dshr-org-8024 102 12 problem problem NN blog-dshr-org-8024 102 13 of of IN blog-dshr-org-8024 102 14 untrustworthy untrustworthy JJ blog-dshr-org-8024 102 15 CAs CAs NNP blog-dshr-org-8024 102 16 by by IN blog-dshr-org-8024 102 17 eliminating eliminate VBG blog-dshr-org-8024 102 18 the the DT blog-dshr-org-8024 102 19 need need NN blog-dshr-org-8024 102 20 for for IN blog-dshr-org-8024 102 21 trust trust NN blog-dshr-org-8024 102 22 . . . blog-dshr-org-8024 103 1 CT CT NNP blog-dshr-org-8024 103 2 's 's POS blog-dshr-org-8024 103 3 approach approach NN blog-dshr-org-8024 103 4 instead instead RB blog-dshr-org-8024 103 5 is be VBZ blog-dshr-org-8024 103 6 to to TO blog-dshr-org-8024 103 7 provide provide VB blog-dshr-org-8024 103 8 a a DT blog-dshr-org-8024 103 9 mechanism mechanism NN blog-dshr-org-8024 103 10 by by IN blog-dshr-org-8024 103 11 which which WDT blog-dshr-org-8024 103 12 breaches breach NNS blog-dshr-org-8024 103 13 of of IN blog-dshr-org-8024 103 14 trust trust NN blog-dshr-org-8024 103 15 , , , blog-dshr-org-8024 103 16 both both CC blog-dshr-org-8024 103 17 by by IN blog-dshr-org-8024 103 18 the the DT blog-dshr-org-8024 103 19 CAs ca NNS blog-dshr-org-8024 103 20 and and CC blog-dshr-org-8024 103 21 by by IN blog-dshr-org-8024 103 22 the the DT blog-dshr-org-8024 103 23 attestors attestor NNS blog-dshr-org-8024 103 24 , , , blog-dshr-org-8024 103 25 can can MD blog-dshr-org-8024 103 26 be be VB blog-dshr-org-8024 103 27 rapidly rapidly RB blog-dshr-org-8024 103 28 and and CC blog-dshr-org-8024 103 29 unambiguously unambiguously RB blog-dshr-org-8024 103 30 detected detect VBN blog-dshr-org-8024 103 31 . . . blog-dshr-org-8024 104 1 [ [ -LRB- blog-dshr-org-8024 104 2 Slide slide NN blog-dshr-org-8024 104 3 7 7 CD blog-dshr-org-8024 104 4 ] ] -RRB- blog-dshr-org-8024 104 5 Source source NN blog-dshr-org-8024 104 6 Here here RB blog-dshr-org-8024 104 7 is be VBZ blog-dshr-org-8024 104 8 a a DT blog-dshr-org-8024 104 9 brief brief JJ blog-dshr-org-8024 104 10 overview overview NN blog-dshr-org-8024 104 11 of of IN blog-dshr-org-8024 104 12 how how WRB blog-dshr-org-8024 104 13 CT CT NNP blog-dshr-org-8024 104 14 works work VBZ blog-dshr-org-8024 104 15 to to TO blog-dshr-org-8024 104 16 detect detect VB blog-dshr-org-8024 104 17 breaches breach NNS blog-dshr-org-8024 104 18 of of IN blog-dshr-org-8024 104 19 trust trust NN blog-dshr-org-8024 104 20 . . . blog-dshr-org-8024 105 1 The the DT blog-dshr-org-8024 105 2 system system NN blog-dshr-org-8024 105 3 has have VBZ blog-dshr-org-8024 105 4 the the DT blog-dshr-org-8024 105 5 following follow VBG blog-dshr-org-8024 105 6 components component NNS blog-dshr-org-8024 105 7 : : : blog-dshr-org-8024 105 8 Logs Logs NNP blog-dshr-org-8024 105 9 , , , blog-dshr-org-8024 105 10 to to IN blog-dshr-org-8024 105 11 which which WDT blog-dshr-org-8024 105 12 CAs ca NNS blog-dshr-org-8024 105 13 report report VBP blog-dshr-org-8024 105 14 their -PRON- PRP$ blog-dshr-org-8024 105 15 current current JJ blog-dshr-org-8024 105 16 certificates certificate NNS blog-dshr-org-8024 105 17 , , , blog-dshr-org-8024 105 18 and and CC blog-dshr-org-8024 105 19 from from IN blog-dshr-org-8024 105 20 which which WDT blog-dshr-org-8024 105 21 they -PRON- PRP blog-dshr-org-8024 105 22 obtain obtain VBP blog-dshr-org-8024 105 23 attestations attestation NNS blog-dshr-org-8024 105 24 , , , blog-dshr-org-8024 105 25 called call VBD blog-dshr-org-8024 105 26 Signed Signed NNP blog-dshr-org-8024 105 27 Certificate Certificate NNP blog-dshr-org-8024 105 28 Timestamps Timestamps NNPS blog-dshr-org-8024 105 29 ( ( -LRB- blog-dshr-org-8024 105 30 SCTs SCTs NNP blog-dshr-org-8024 105 31 ) ) -RRB- blog-dshr-org-8024 105 32 , , , blog-dshr-org-8024 105 33 that that IN blog-dshr-org-8024 105 34 owners owner NNS blog-dshr-org-8024 105 35 can can MD blog-dshr-org-8024 105 36 attach attach VB blog-dshr-org-8024 105 37 to to IN blog-dshr-org-8024 105 38 their -PRON- PRP$ blog-dshr-org-8024 105 39 certificates certificate NNS blog-dshr-org-8024 105 40 . . . blog-dshr-org-8024 106 1 Clients client NNS blog-dshr-org-8024 106 2 can can MD blog-dshr-org-8024 106 3 verify verify VB blog-dshr-org-8024 106 4 the the DT blog-dshr-org-8024 106 5 signature signature NN blog-dshr-org-8024 106 6 on on IN blog-dshr-org-8024 106 7 the the DT blog-dshr-org-8024 106 8 SCT SCT NNP blog-dshr-org-8024 106 9 , , , blog-dshr-org-8024 106 10 then then RB blog-dshr-org-8024 106 11 verify verify VBP blog-dshr-org-8024 106 12 that that IN blog-dshr-org-8024 106 13 the the DT blog-dshr-org-8024 106 14 hash hash NN blog-dshr-org-8024 106 15 it -PRON- PRP blog-dshr-org-8024 106 16 contains contain VBZ blog-dshr-org-8024 106 17 matches match NNS blog-dshr-org-8024 106 18 the the DT blog-dshr-org-8024 106 19 certificate certificate NN blog-dshr-org-8024 106 20 . . . blog-dshr-org-8024 107 1 If if IN blog-dshr-org-8024 107 2 it -PRON- PRP blog-dshr-org-8024 107 3 does do VBZ blog-dshr-org-8024 107 4 , , , blog-dshr-org-8024 107 5 the the DT blog-dshr-org-8024 107 6 certificate certificate NN blog-dshr-org-8024 107 7 was be VBD blog-dshr-org-8024 107 8 the the DT blog-dshr-org-8024 107 9 one one NN blog-dshr-org-8024 107 10 that that WDT blog-dshr-org-8024 107 11 the the DT blog-dshr-org-8024 107 12 CA CA NNP blog-dshr-org-8024 107 13 reported report VBD blog-dshr-org-8024 107 14 to to IN blog-dshr-org-8024 107 15 the the DT blog-dshr-org-8024 107 16 log log NN blog-dshr-org-8024 107 17 , , , blog-dshr-org-8024 107 18 and and CC blog-dshr-org-8024 107 19 the the DT blog-dshr-org-8024 107 20 owner owner NN blog-dshr-org-8024 107 21 validated validate VBD blog-dshr-org-8024 107 22 . . . blog-dshr-org-8024 108 1 It -PRON- PRP blog-dshr-org-8024 108 2 is be VBZ blog-dshr-org-8024 108 3 envisaged envisage VBN blog-dshr-org-8024 108 4 that that IN blog-dshr-org-8024 108 5 there there EX blog-dshr-org-8024 108 6 will will MD blog-dshr-org-8024 108 7 be be VB blog-dshr-org-8024 108 8 tens ten NNS blog-dshr-org-8024 108 9 but but CC blog-dshr-org-8024 108 10 not not RB blog-dshr-org-8024 108 11 thousands thousand NNS blog-dshr-org-8024 108 12 of of IN blog-dshr-org-8024 108 13 logs log NNS blog-dshr-org-8024 108 14 ; ; : blog-dshr-org-8024 108 15 Chrome Chrome NNP blog-dshr-org-8024 108 16 currently currently RB blog-dshr-org-8024 108 17 trusts trust VBZ blog-dshr-org-8024 108 18 46 46 CD blog-dshr-org-8024 108 19 logs log NNS blog-dshr-org-8024 108 20 operated operate VBN blog-dshr-org-8024 108 21 by by IN blog-dshr-org-8024 108 22 11 11 CD blog-dshr-org-8024 108 23 organizations organization NNS blog-dshr-org-8024 108 24 . . . blog-dshr-org-8024 109 1 Each each DT blog-dshr-org-8024 109 2 log log NN blog-dshr-org-8024 109 3 maintains maintain VBZ blog-dshr-org-8024 109 4 a a DT blog-dshr-org-8024 109 5 Merkle Merkle NNP blog-dshr-org-8024 109 6 tree tree NN blog-dshr-org-8024 109 7 data datum NNS blog-dshr-org-8024 109 8 structure structure NN blog-dshr-org-8024 109 9 of of IN blog-dshr-org-8024 109 10 the the DT blog-dshr-org-8024 109 11 certificates certificate NNS blog-dshr-org-8024 109 12 for for IN blog-dshr-org-8024 109 13 which which WDT blog-dshr-org-8024 109 14 it -PRON- PRP blog-dshr-org-8024 109 15 has have VBZ blog-dshr-org-8024 109 16 issued issue VBN blog-dshr-org-8024 109 17 SCTs sct NNS blog-dshr-org-8024 109 18 . . . blog-dshr-org-8024 110 1 Monitors monitor NNS blog-dshr-org-8024 110 2 , , , blog-dshr-org-8024 110 3 which which WDT blog-dshr-org-8024 110 4 periodically periodically RB blog-dshr-org-8024 110 5 download download VBP blog-dshr-org-8024 110 6 all all RB blog-dshr-org-8024 110 7 newly newly RB blog-dshr-org-8024 110 8 added add VBN blog-dshr-org-8024 110 9 entries entry NNS blog-dshr-org-8024 110 10 from from IN blog-dshr-org-8024 110 11 the the DT blog-dshr-org-8024 110 12 logs log NNS blog-dshr-org-8024 110 13 that that WDT blog-dshr-org-8024 110 14 they -PRON- PRP blog-dshr-org-8024 110 15 monitor monitor VBP blog-dshr-org-8024 110 16 , , , blog-dshr-org-8024 110 17 verify verify VBP blog-dshr-org-8024 110 18 that that IN blog-dshr-org-8024 110 19 they -PRON- PRP blog-dshr-org-8024 110 20 have have VBP blog-dshr-org-8024 110 21 in in IN blog-dshr-org-8024 110 22 fact fact NN blog-dshr-org-8024 110 23 been be VBN blog-dshr-org-8024 110 24 added add VBN blog-dshr-org-8024 110 25 to to IN blog-dshr-org-8024 110 26 the the DT blog-dshr-org-8024 110 27 log log NN blog-dshr-org-8024 110 28 , , , blog-dshr-org-8024 110 29 and and CC blog-dshr-org-8024 110 30 perform perform VB blog-dshr-org-8024 110 31 a a DT blog-dshr-org-8024 110 32 series series NN blog-dshr-org-8024 110 33 of of IN blog-dshr-org-8024 110 34 validity validity NN blog-dshr-org-8024 110 35 checks check NNS blog-dshr-org-8024 110 36 on on IN blog-dshr-org-8024 110 37 them -PRON- PRP blog-dshr-org-8024 110 38 . . . blog-dshr-org-8024 111 1 They -PRON- PRP blog-dshr-org-8024 111 2 also also RB blog-dshr-org-8024 111 3 thus thus RB blog-dshr-org-8024 111 4 act act VBP blog-dshr-org-8024 111 5 as as IN blog-dshr-org-8024 111 6 backups backup NNS blog-dshr-org-8024 111 7 for for IN blog-dshr-org-8024 111 8 the the DT blog-dshr-org-8024 111 9 logs log NNS blog-dshr-org-8024 111 10 they -PRON- PRP blog-dshr-org-8024 111 11 monitor monitor VBP blog-dshr-org-8024 111 12 . . . blog-dshr-org-8024 112 1 Auditors auditor NNS blog-dshr-org-8024 112 2 , , , blog-dshr-org-8024 112 3 which which WDT blog-dshr-org-8024 112 4 use use VBP blog-dshr-org-8024 112 5 the the DT blog-dshr-org-8024 112 6 Merkle Merkle NNP blog-dshr-org-8024 112 7 tree tree NN blog-dshr-org-8024 112 8 of of IN blog-dshr-org-8024 112 9 the the DT blog-dshr-org-8024 112 10 logs log NNS blog-dshr-org-8024 112 11 they -PRON- PRP blog-dshr-org-8024 112 12 audit audit VBP blog-dshr-org-8024 112 13 to to TO blog-dshr-org-8024 112 14 verify verify VB blog-dshr-org-8024 112 15 that that IN blog-dshr-org-8024 112 16 certificates certificate NNS blog-dshr-org-8024 112 17 have have VBP blog-dshr-org-8024 112 18 been be VBN blog-dshr-org-8024 112 19 correctly correctly RB blog-dshr-org-8024 112 20 appended append VBN blog-dshr-org-8024 112 21 to to IN blog-dshr-org-8024 112 22 the the DT blog-dshr-org-8024 112 23 log log NN blog-dshr-org-8024 112 24 , , , blog-dshr-org-8024 112 25 and and CC blog-dshr-org-8024 112 26 that that IN blog-dshr-org-8024 112 27 no no DT blog-dshr-org-8024 112 28 retroactive retroactive JJ blog-dshr-org-8024 112 29 insertions insertion NNS blog-dshr-org-8024 112 30 , , , blog-dshr-org-8024 112 31 deletions deletion NNS blog-dshr-org-8024 112 32 or or CC blog-dshr-org-8024 112 33 modifications modification NNS blog-dshr-org-8024 112 34 of of IN blog-dshr-org-8024 112 35 the the DT blog-dshr-org-8024 112 36 certificates certificate NNS blog-dshr-org-8024 112 37 in in IN blog-dshr-org-8024 112 38 the the DT blog-dshr-org-8024 112 39 log log NN blog-dshr-org-8024 112 40 have have VBP blog-dshr-org-8024 112 41 taken take VBN blog-dshr-org-8024 112 42 place place NN blog-dshr-org-8024 112 43 . . . blog-dshr-org-8024 113 1 Clients client NNS blog-dshr-org-8024 113 2 can can MD blog-dshr-org-8024 113 3 use use VB blog-dshr-org-8024 113 4 auditors auditor NNS blog-dshr-org-8024 113 5 to to TO blog-dshr-org-8024 113 6 determine determine VB blog-dshr-org-8024 113 7 whether whether IN blog-dshr-org-8024 113 8 a a DT blog-dshr-org-8024 113 9 certificate certificate NN blog-dshr-org-8024 113 10 appears appear VBZ blog-dshr-org-8024 113 11 in in IN blog-dshr-org-8024 113 12 a a DT blog-dshr-org-8024 113 13 log log NN blog-dshr-org-8024 113 14 . . . blog-dshr-org-8024 114 1 If if IN blog-dshr-org-8024 114 2 it -PRON- PRP blog-dshr-org-8024 114 3 does do VBZ blog-dshr-org-8024 114 4 n't not RB blog-dshr-org-8024 114 5 , , , blog-dshr-org-8024 114 6 they -PRON- PRP blog-dshr-org-8024 114 7 can can MD blog-dshr-org-8024 114 8 use use VB blog-dshr-org-8024 114 9 the the DT blog-dshr-org-8024 114 10 SCT SCT NNP blog-dshr-org-8024 114 11 to to TO blog-dshr-org-8024 114 12 prove prove VB blog-dshr-org-8024 114 13 that that IN blog-dshr-org-8024 114 14 the the DT blog-dshr-org-8024 114 15 log log NN blog-dshr-org-8024 114 16 misbehaved misbehave VBD blog-dshr-org-8024 114 17 . . . blog-dshr-org-8024 115 1 In in IN blog-dshr-org-8024 115 2 this this DT blog-dshr-org-8024 115 3 way way NN blog-dshr-org-8024 115 4 , , , blog-dshr-org-8024 115 5 auditors auditor NNS blog-dshr-org-8024 115 6 , , , blog-dshr-org-8024 115 7 monitors monitor NNS blog-dshr-org-8024 115 8 and and CC blog-dshr-org-8024 115 9 clients client NNS blog-dshr-org-8024 115 10 cooperate cooperate VBP blog-dshr-org-8024 115 11 to to TO blog-dshr-org-8024 115 12 verify verify VB blog-dshr-org-8024 115 13 the the DT blog-dshr-org-8024 115 14 correct correct JJ blog-dshr-org-8024 115 15 operation operation NN blog-dshr-org-8024 115 16 of of IN blog-dshr-org-8024 115 17 logs logs NNP blog-dshr-org-8024 115 18 , , , blog-dshr-org-8024 115 19 which which WDT blog-dshr-org-8024 115 20 in in IN blog-dshr-org-8024 115 21 turn turn NN blog-dshr-org-8024 115 22 provides provide VBZ blog-dshr-org-8024 115 23 clients client NNS blog-dshr-org-8024 115 24 with with IN blog-dshr-org-8024 115 25 confidence confidence NN blog-dshr-org-8024 115 26 in in IN blog-dshr-org-8024 115 27 the the DT blog-dshr-org-8024 115 28 [ [ -LRB- blog-dshr-org-8024 115 29 certificate certificate NN blog-dshr-org-8024 115 30 , , , blog-dshr-org-8024 115 31 attestation attestation NN blog-dshr-org-8024 115 32 ] ] -RRB- blog-dshr-org-8024 115 33 pairs pair NNS blog-dshr-org-8024 115 34 they -PRON- PRP blog-dshr-org-8024 115 35 use use VBP blog-dshr-org-8024 115 36 to to TO blog-dshr-org-8024 115 37 secure secure VB blog-dshr-org-8024 115 38 their -PRON- PRP$ blog-dshr-org-8024 115 39 communications communication NNS blog-dshr-org-8024 115 40 . . . blog-dshr-org-8024 116 1 Although although IN blog-dshr-org-8024 116 2 the the DT blog-dshr-org-8024 116 3 process process NN blog-dshr-org-8024 116 4 works work VBZ blog-dshr-org-8024 116 5 if if IN blog-dshr-org-8024 116 6 certificate certificate NN blog-dshr-org-8024 116 7 owners owner NNS blog-dshr-org-8024 116 8 each each DT blog-dshr-org-8024 116 9 obtain obtain VBP blog-dshr-org-8024 116 10 their -PRON- PRP$ blog-dshr-org-8024 116 11 SCTs sct NNS blog-dshr-org-8024 116 12 from from IN blog-dshr-org-8024 116 13 only only RB blog-dshr-org-8024 116 14 one one CD blog-dshr-org-8024 116 15 log log NN blog-dshr-org-8024 116 16 , , , blog-dshr-org-8024 116 17 they -PRON- PRP blog-dshr-org-8024 116 18 should should MD blog-dshr-org-8024 116 19 get get VB blog-dshr-org-8024 116 20 them -PRON- PRP blog-dshr-org-8024 116 21 from from IN blog-dshr-org-8024 116 22 multiple multiple JJ blog-dshr-org-8024 116 23 logs log NNS blog-dshr-org-8024 116 24 and and CC blog-dshr-org-8024 116 25 send send VB blog-dshr-org-8024 116 26 a a DT blog-dshr-org-8024 116 27 random random JJ blog-dshr-org-8024 116 28 selection selection NN blog-dshr-org-8024 116 29 of of IN blog-dshr-org-8024 116 30 their -PRON- PRP$ blog-dshr-org-8024 116 31 SCTs sct NNS blog-dshr-org-8024 116 32 to to IN blog-dshr-org-8024 116 33 each each DT blog-dshr-org-8024 116 34 client client NN blog-dshr-org-8024 116 35 to to TO blog-dshr-org-8024 116 36 improve improve VB blog-dshr-org-8024 116 37 robustness robustness NN blog-dshr-org-8024 116 38 . . . blog-dshr-org-8024 117 1 Note note VB blog-dshr-org-8024 117 2 the the DT blog-dshr-org-8024 117 3 key key JJ blog-dshr-org-8024 117 4 architectural architectural JJ blog-dshr-org-8024 117 5 features feature NNS blog-dshr-org-8024 117 6 of of IN blog-dshr-org-8024 117 7 CT CT NNP blog-dshr-org-8024 117 8 : : : blog-dshr-org-8024 117 9 [ [ -LRB- blog-dshr-org-8024 117 10 Slide slide NN blog-dshr-org-8024 117 11 8 8 CD blog-dshr-org-8024 117 12 ] ] -RRB- blog-dshr-org-8024 117 13 Certificate Certificate NNP blog-dshr-org-8024 117 14 Transparency Transparency NNP blog-dshr-org-8024 117 15 Architecture Architecture NNP blog-dshr-org-8024 117 16 : : : blog-dshr-org-8024 117 17 The the DT blog-dshr-org-8024 117 18 certificate certificate NN blog-dshr-org-8024 117 19 data datum NNS blog-dshr-org-8024 117 20 is be VBZ blog-dshr-org-8024 117 21 held hold VBN blog-dshr-org-8024 117 22 by by IN blog-dshr-org-8024 117 23 multiple multiple JJ blog-dshr-org-8024 117 24 independent independent JJ blog-dshr-org-8024 117 25 services service NNS blog-dshr-org-8024 117 26 . . . blog-dshr-org-8024 118 1 They -PRON- PRP blog-dshr-org-8024 118 2 get get VBP blog-dshr-org-8024 118 3 the the DT blog-dshr-org-8024 118 4 data datum NNS blog-dshr-org-8024 118 5 directly directly RB blog-dshr-org-8024 118 6 from from IN blog-dshr-org-8024 118 7 the the DT blog-dshr-org-8024 118 8 source source NN blog-dshr-org-8024 118 9 , , , blog-dshr-org-8024 118 10 not not RB blog-dshr-org-8024 118 11 via via IN blog-dshr-org-8024 118 12 replication replication NN blog-dshr-org-8024 118 13 from from IN blog-dshr-org-8024 118 14 other other JJ blog-dshr-org-8024 118 15 services service NNS blog-dshr-org-8024 118 16 . . . blog-dshr-org-8024 119 1 Clients client NNS blog-dshr-org-8024 119 2 access access VBP blog-dshr-org-8024 119 3 the the DT blog-dshr-org-8024 119 4 data datum NNS blog-dshr-org-8024 119 5 from from IN blog-dshr-org-8024 119 6 a a DT blog-dshr-org-8024 119 7 random random JJ blog-dshr-org-8024 119 8 selection selection NN blog-dshr-org-8024 119 9 of of IN blog-dshr-org-8024 119 10 the the DT blog-dshr-org-8024 119 11 services service NNS blog-dshr-org-8024 119 12 . . . blog-dshr-org-8024 120 1 There there EX blog-dshr-org-8024 120 2 is be VBZ blog-dshr-org-8024 120 3 an an DT blog-dshr-org-8024 120 4 audit audit NN blog-dshr-org-8024 120 5 process process NN blog-dshr-org-8024 120 6 continually continually RB blog-dshr-org-8024 120 7 monitoring monitor VBG blog-dshr-org-8024 120 8 the the DT blog-dshr-org-8024 120 9 services service NNS blog-dshr-org-8024 120 10 looking look VBG blog-dshr-org-8024 120 11 for for IN blog-dshr-org-8024 120 12 inconsistencies inconsistency NNS blog-dshr-org-8024 120 13 . . . blog-dshr-org-8024 121 1 These these DT blog-dshr-org-8024 121 2 are be VBP blog-dshr-org-8024 121 3 all all DT blog-dshr-org-8024 121 4 also also RB blog-dshr-org-8024 121 5 features feature NNS blog-dshr-org-8024 121 6 of of IN blog-dshr-org-8024 121 7 the the DT blog-dshr-org-8024 121 8 protocol protocol NN blog-dshr-org-8024 121 9 underlying underlie VBG blog-dshr-org-8024 121 10 the the DT blog-dshr-org-8024 121 11 LOCKSS LOCKSS NNP blog-dshr-org-8024 121 12 digital digital JJ blog-dshr-org-8024 121 13 preservation preservation NN blog-dshr-org-8024 121 14 system system NN blog-dshr-org-8024 121 15 , , , blog-dshr-org-8024 121 16 published publish VBN blog-dshr-org-8024 121 17 in in IN blog-dshr-org-8024 121 18 2003 2003 CD blog-dshr-org-8024 121 19 . . . blog-dshr-org-8024 122 1 In in IN blog-dshr-org-8024 122 2 both both DT blog-dshr-org-8024 122 3 cases case NNS blog-dshr-org-8024 122 4 , , , blog-dshr-org-8024 122 5 the the DT blog-dshr-org-8024 122 6 random random JJ blog-dshr-org-8024 122 7 choice choice NN blog-dshr-org-8024 122 8 among among IN blog-dshr-org-8024 122 9 a a DT blog-dshr-org-8024 122 10 population population NN blog-dshr-org-8024 122 11 of of IN blog-dshr-org-8024 122 12 independent independent JJ blog-dshr-org-8024 122 13 services service NNS blog-dshr-org-8024 122 14 makes make VBZ blog-dshr-org-8024 122 15 life life NN blog-dshr-org-8024 122 16 hard hard JJ blog-dshr-org-8024 122 17 for for IN blog-dshr-org-8024 122 18 attackers attacker NNS blog-dshr-org-8024 122 19 . . . blog-dshr-org-8024 123 1 If if IN blog-dshr-org-8024 123 2 they -PRON- PRP blog-dshr-org-8024 123 3 are be VBP blog-dshr-org-8024 123 4 to to TO blog-dshr-org-8024 123 5 avoid avoid VB blog-dshr-org-8024 123 6 detection detection NN blog-dshr-org-8024 123 7 , , , blog-dshr-org-8024 123 8 they -PRON- PRP blog-dshr-org-8024 123 9 must must MD blog-dshr-org-8024 123 10 compromise compromise VB blog-dshr-org-8024 123 11 the the DT blog-dshr-org-8024 123 12 majority majority NN blog-dshr-org-8024 123 13 of of IN blog-dshr-org-8024 123 14 the the DT blog-dshr-org-8024 123 15 services service NNS blog-dshr-org-8024 123 16 , , , blog-dshr-org-8024 123 17 and and CC blog-dshr-org-8024 123 18 provide provide VB blog-dshr-org-8024 123 19 correct correct JJ blog-dshr-org-8024 123 20 information information NN blog-dshr-org-8024 123 21 to to IN blog-dshr-org-8024 123 22 auditors auditor NNS blog-dshr-org-8024 123 23 while while IN blog-dshr-org-8024 123 24 providing provide VBG blog-dshr-org-8024 123 25 false false JJ blog-dshr-org-8024 123 26 information information NN blog-dshr-org-8024 123 27 to to IN blog-dshr-org-8024 123 28 victims victim NNS blog-dshr-org-8024 123 29 . . . blog-dshr-org-8024 124 1 Looking look VBG blog-dshr-org-8024 124 2 at at IN blog-dshr-org-8024 124 3 the the DT blog-dshr-org-8024 124 4 list list NN blog-dshr-org-8024 124 5 of of IN blog-dshr-org-8024 124 6 logs logs NNP blog-dshr-org-8024 124 7 Chrome Chrome NNP blog-dshr-org-8024 124 8 currently currently RB blog-dshr-org-8024 124 9 trusts trust VBZ blog-dshr-org-8024 124 10 , , , blog-dshr-org-8024 124 11 it -PRON- PRP blog-dshr-org-8024 124 12 is be VBZ blog-dshr-org-8024 124 13 clear clear JJ blog-dshr-org-8024 124 14 that that IN blog-dshr-org-8024 124 15 almost almost RB blog-dshr-org-8024 124 16 all all DT blog-dshr-org-8024 124 17 are be VBP blog-dshr-org-8024 124 18 operated operate VBN blog-dshr-org-8024 124 19 by by IN blog-dshr-org-8024 124 20 CAs ca NNS blog-dshr-org-8024 124 21 themselves -PRON- PRP blog-dshr-org-8024 124 22 . . . blog-dshr-org-8024 125 1 Assuming assume VBG blog-dshr-org-8024 125 2 that that IN blog-dshr-org-8024 125 3 each each DT blog-dshr-org-8024 125 4 monitor monitor NN blog-dshr-org-8024 125 5 at at IN blog-dshr-org-8024 125 6 each each DT blog-dshr-org-8024 125 7 CA CA NNP blog-dshr-org-8024 125 8 is be VBZ blog-dshr-org-8024 125 9 monitoring monitor VBG blog-dshr-org-8024 125 10 some some DT blog-dshr-org-8024 125 11 of of IN blog-dshr-org-8024 125 12 the the DT blog-dshr-org-8024 125 13 other other JJ blog-dshr-org-8024 125 14 logs log NNS blog-dshr-org-8024 125 15 as as RB blog-dshr-org-8024 125 16 well well RB blog-dshr-org-8024 125 17 as as IN blog-dshr-org-8024 125 18 the the DT blog-dshr-org-8024 125 19 one one NN blog-dshr-org-8024 125 20 it -PRON- PRP blog-dshr-org-8024 125 21 operates operate VBZ blog-dshr-org-8024 125 22 , , , blog-dshr-org-8024 125 23 this this DT blog-dshr-org-8024 125 24 does do VBZ blog-dshr-org-8024 125 25 not not RB blog-dshr-org-8024 125 26 represent represent VB blog-dshr-org-8024 125 27 a a DT blog-dshr-org-8024 125 28 threat threat NN blog-dshr-org-8024 125 29 , , , blog-dshr-org-8024 125 30 because because IN blog-dshr-org-8024 125 31 misbehavior misbehavior JJ blog-dshr-org-8024 125 32 by by IN blog-dshr-org-8024 125 33 that that DT blog-dshr-org-8024 125 34 CA CA NNP blog-dshr-org-8024 125 35 would would MD blog-dshr-org-8024 125 36 be be VB blog-dshr-org-8024 125 37 detected detect VBN blog-dshr-org-8024 125 38 by by IN blog-dshr-org-8024 125 39 other other JJ blog-dshr-org-8024 125 40 CAs ca NNS blog-dshr-org-8024 125 41 . . . blog-dshr-org-8024 126 1 A a DT blog-dshr-org-8024 126 2 CA CA NNP blog-dshr-org-8024 126 3 's 's POS blog-dshr-org-8024 126 4 monitor monitor NN blog-dshr-org-8024 126 5 that that WDT blog-dshr-org-8024 126 6 was be VBD blog-dshr-org-8024 126 7 tempted tempt VBN blog-dshr-org-8024 126 8 to to TO blog-dshr-org-8024 126 9 cover cover VB blog-dshr-org-8024 126 10 up up RP blog-dshr-org-8024 126 11 misbehavior misbehavior NN blog-dshr-org-8024 126 12 by by IN blog-dshr-org-8024 126 13 a a DT blog-dshr-org-8024 126 14 different different JJ blog-dshr-org-8024 126 15 CA CA NNP blog-dshr-org-8024 126 16 's 's POS blog-dshr-org-8024 126 17 log log NN blog-dshr-org-8024 126 18 it -PRON- PRP blog-dshr-org-8024 126 19 was be VBD blog-dshr-org-8024 126 20 monitoring monitor VBG blog-dshr-org-8024 126 21 would would MD blog-dshr-org-8024 126 22 risk risk VB blog-dshr-org-8024 126 23 being be VBG blog-dshr-org-8024 126 24 " " `` blog-dshr-org-8024 126 25 named name VBN blog-dshr-org-8024 126 26 and and CC blog-dshr-org-8024 126 27 shamed shame VBN blog-dshr-org-8024 126 28 " " '' blog-dshr-org-8024 126 29 by by IN blog-dshr-org-8024 126 30 some some DT blog-dshr-org-8024 126 31 other other JJ blog-dshr-org-8024 126 32 CA CA NNP blog-dshr-org-8024 126 33 monitoring monitor VBG blog-dshr-org-8024 126 34 the the DT blog-dshr-org-8024 126 35 same same JJ blog-dshr-org-8024 126 36 log log NN blog-dshr-org-8024 126 37 , , , blog-dshr-org-8024 126 38 just just RB blog-dshr-org-8024 126 39 as as IN blog-dshr-org-8024 126 40 the the DT blog-dshr-org-8024 126 41 misbehaving misbehaving NN blog-dshr-org-8024 126 42 CA CA NNP blog-dshr-org-8024 126 43 would would MD blog-dshr-org-8024 126 44 be be VB blog-dshr-org-8024 126 45 " " `` blog-dshr-org-8024 126 46 named name VBN blog-dshr-org-8024 126 47 and and CC blog-dshr-org-8024 126 48 shamed shame VBN blog-dshr-org-8024 126 49 " " '' blog-dshr-org-8024 126 50 . . . blog-dshr-org-8024 127 1 It -PRON- PRP blog-dshr-org-8024 127 2 is be VBZ blog-dshr-org-8024 127 3 important important JJ blog-dshr-org-8024 127 4 to to TO blog-dshr-org-8024 127 5 observe observe VB blog-dshr-org-8024 127 6 that that DT blog-dshr-org-8024 127 7 , , , blog-dshr-org-8024 127 8 despite despite IN blog-dshr-org-8024 127 9 the the DT blog-dshr-org-8024 127 10 fact fact NN blog-dshr-org-8024 127 11 that that IN blog-dshr-org-8024 127 12 CAs ca NNS blog-dshr-org-8024 127 13 operate operate VBP blog-dshr-org-8024 127 14 the the DT blog-dshr-org-8024 127 15 majority majority NN blog-dshr-org-8024 127 16 of of IN blog-dshr-org-8024 127 17 the the DT blog-dshr-org-8024 127 18 CT CT NNP blog-dshr-org-8024 127 19 infrastructure infrastructure NN blog-dshr-org-8024 127 20 , , , blog-dshr-org-8024 127 21 its -PRON- PRP$ blog-dshr-org-8024 127 22 effectiveness effectiveness NN blog-dshr-org-8024 127 23 in in IN blog-dshr-org-8024 127 24 disciplining discipline VBG blog-dshr-org-8024 127 25 CAs CAs NNP blog-dshr-org-8024 127 26 is be VBZ blog-dshr-org-8024 127 27 not not RB blog-dshr-org-8024 127 28 impaired impaired JJ blog-dshr-org-8024 127 29 . . . blog-dshr-org-8024 128 1 All all DT blog-dshr-org-8024 128 2 three three CD blog-dshr-org-8024 128 3 major major JJ blog-dshr-org-8024 128 4 CAs ca NNS blog-dshr-org-8024 128 5 have have VBP blog-dshr-org-8024 128 6 suffered suffer VBN blog-dshr-org-8024 128 7 reputational reputational JJ blog-dshr-org-8024 128 8 damage damage NN blog-dshr-org-8024 128 9 from from IN blog-dshr-org-8024 128 10 recent recent JJ blog-dshr-org-8024 128 11 security security NN blog-dshr-org-8024 128 12 failures failure NNS blog-dshr-org-8024 128 13 , , , blog-dshr-org-8024 128 14 although although IN blog-dshr-org-8024 128 15 because because IN blog-dshr-org-8024 128 16 they -PRON- PRP blog-dshr-org-8024 128 17 are be VBP blog-dshr-org-8024 128 18 " " `` blog-dshr-org-8024 128 19 too too RB blog-dshr-org-8024 128 20 big big JJ blog-dshr-org-8024 128 21 to to TO blog-dshr-org-8024 128 22 fail fail VB blog-dshr-org-8024 128 23 " " `` blog-dshr-org-8024 128 24 this this DT blog-dshr-org-8024 128 25 has have VBZ blog-dshr-org-8024 128 26 n't not RB blog-dshr-org-8024 128 27 impacted impact VBN blog-dshr-org-8024 128 28 their -PRON- PRP$ blog-dshr-org-8024 128 29 business business NN blog-dshr-org-8024 128 30 much much JJ blog-dshr-org-8024 128 31 . . . blog-dshr-org-8024 129 1 However however RB blog-dshr-org-8024 129 2 , , , blog-dshr-org-8024 129 3 as as IN blog-dshr-org-8024 129 4 whales whale NNS blog-dshr-org-8024 129 5 in in IN blog-dshr-org-8024 129 6 a a DT blog-dshr-org-8024 129 7 large large JJ blog-dshr-org-8024 129 8 school school NN blog-dshr-org-8024 129 9 of of IN blog-dshr-org-8024 129 10 minnows minnow NNS blog-dshr-org-8024 129 11 it -PRON- PRP blog-dshr-org-8024 129 12 is be VBZ blog-dshr-org-8024 129 13 in in IN blog-dshr-org-8024 129 14 their -PRON- PRP$ blog-dshr-org-8024 129 15 interest interest NN blog-dshr-org-8024 129 16 to to TO blog-dshr-org-8024 129 17 impose impose VB blog-dshr-org-8024 129 18 costs cost NNS blog-dshr-org-8024 129 19 ( ( -LRB- blog-dshr-org-8024 129 20 for for IN blog-dshr-org-8024 129 21 implementing implement VBG blog-dshr-org-8024 129 22 CT CT NNP blog-dshr-org-8024 129 23 ) ) -RRB- blog-dshr-org-8024 129 24 and and CC blog-dshr-org-8024 129 25 penalties penalty NNS blog-dshr-org-8024 129 26 ( ( -LRB- blog-dshr-org-8024 129 27 for for IN blog-dshr-org-8024 129 28 security security NN blog-dshr-org-8024 129 29 lapses lapse NNS blog-dshr-org-8024 129 30 ) ) -RRB- blog-dshr-org-8024 129 31 on on IN blog-dshr-org-8024 129 32 the the DT blog-dshr-org-8024 129 33 minnows minnow NNS blog-dshr-org-8024 129 34 . . . blog-dshr-org-8024 130 1 Note note VB blog-dshr-org-8024 130 2 that that IN blog-dshr-org-8024 130 3 Google Google NNP blog-dshr-org-8024 130 4 was be VBD blog-dshr-org-8024 130 5 sufficiently sufficiently RB blog-dshr-org-8024 130 6 annoyed annoy VBN blog-dshr-org-8024 130 7 with with IN blog-dshr-org-8024 130 8 Symantec Symantec NNP blog-dshr-org-8024 130 9 's 's POS blog-dshr-org-8024 130 10 persistent persistent JJ blog-dshr-org-8024 130 11 lack lack NN blog-dshr-org-8024 130 12 of of IN blog-dshr-org-8024 130 13 security security NN blog-dshr-org-8024 130 14 that that WDT blog-dshr-org-8024 130 15 it -PRON- PRP blog-dshr-org-8024 130 16 set set VBD blog-dshr-org-8024 130 17 up up RP blog-dshr-org-8024 130 18 its -PRON- PRP$ blog-dshr-org-8024 130 19 own own JJ blog-dshr-org-8024 130 20 CA ca NN blog-dshr-org-8024 130 21 . . . blog-dshr-org-8024 131 1 The the DT blog-dshr-org-8024 131 2 threat threat NN blog-dshr-org-8024 131 3 that that IN blog-dshr-org-8024 131 4 their -PRON- PRP$ blog-dshr-org-8024 131 5 business business NN blog-dshr-org-8024 131 6 could could MD blog-dshr-org-8024 131 7 be be VB blog-dshr-org-8024 131 8 taken take VBN blog-dshr-org-8024 131 9 away away RB blog-dshr-org-8024 131 10 by by IN blog-dshr-org-8024 131 11 the the DT blog-dshr-org-8024 131 12 tech tech NN blog-dshr-org-8024 131 13 oligopoly oligopoly NN blog-dshr-org-8024 131 14 is be VBZ blog-dshr-org-8024 131 15 real real JJ blog-dshr-org-8024 131 16 , , , blog-dshr-org-8024 131 17 and and CC blog-dshr-org-8024 131 18 cooperating cooperate VBG blog-dshr-org-8024 131 19 with with IN blog-dshr-org-8024 131 20 Google Google NNP blog-dshr-org-8024 131 21 may may MD blog-dshr-org-8024 131 22 have have VB blog-dshr-org-8024 131 23 been be VBN blog-dshr-org-8024 131 24 the the DT blog-dshr-org-8024 131 25 least least JJS blog-dshr-org-8024 131 26 bad bad JJ blog-dshr-org-8024 131 27 choice choice NN blog-dshr-org-8024 131 28 . . . blog-dshr-org-8024 132 1 Because because IN blog-dshr-org-8024 132 2 these these DT blog-dshr-org-8024 132 3 major major JJ blog-dshr-org-8024 132 4 corporations corporation NNS blog-dshr-org-8024 132 5 have have VBP blog-dshr-org-8024 132 6 an an DT blog-dshr-org-8024 132 7 incentive incentive NN blog-dshr-org-8024 132 8 to to TO blog-dshr-org-8024 132 9 pay pay VB blog-dshr-org-8024 132 10 for for IN blog-dshr-org-8024 132 11 the the DT blog-dshr-org-8024 132 12 CT CT NNP blog-dshr-org-8024 132 13 infrastructure infrastructure NN blog-dshr-org-8024 132 14 , , , blog-dshr-org-8024 132 15 it -PRON- PRP blog-dshr-org-8024 132 16 is be VBZ blog-dshr-org-8024 132 17 sustainable sustainable JJ blog-dshr-org-8024 132 18 in in IN blog-dshr-org-8024 132 19 a a DT blog-dshr-org-8024 132 20 way way NN blog-dshr-org-8024 132 21 that that WDT blog-dshr-org-8024 132 22 a a DT blog-dshr-org-8024 132 23 market market NN blog-dshr-org-8024 132 24 of of IN blog-dshr-org-8024 132 25 separate separate JJ blog-dshr-org-8024 132 26 businesses business NNS blog-dshr-org-8024 132 27 , , , blog-dshr-org-8024 132 28 or or CC blog-dshr-org-8024 132 29 a a DT blog-dshr-org-8024 132 30 permissionless permissionless NN blog-dshr-org-8024 132 31 blockchain blockchain NN blog-dshr-org-8024 132 32 supported support VBN blog-dshr-org-8024 132 33 by by IN blog-dshr-org-8024 132 34 speculation speculation NN blog-dshr-org-8024 132 35 in in IN blog-dshr-org-8024 132 36 a a DT blog-dshr-org-8024 132 37 cryptocurrency cryptocurrency NN blog-dshr-org-8024 132 38 would would MD blog-dshr-org-8024 132 39 not not RB blog-dshr-org-8024 132 40 be be VB blog-dshr-org-8024 132 41 . . . blog-dshr-org-8024 133 1 Fundamentally fundamentally RB blog-dshr-org-8024 133 2 , , , blog-dshr-org-8024 133 3 if if IN blog-dshr-org-8024 133 4 applications application NNS blog-dshr-org-8024 133 5 such such JJ blog-dshr-org-8024 133 6 as as IN blog-dshr-org-8024 133 7 CT CT NNP blog-dshr-org-8024 133 8 attempt attempt NN blog-dshr-org-8024 133 9 to to TO blog-dshr-org-8024 133 10 provide provide VB blog-dshr-org-8024 133 11 absolute absolute JJ blog-dshr-org-8024 133 12 security security NN blog-dshr-org-8024 133 13 they -PRON- PRP blog-dshr-org-8024 133 14 are be VBP blog-dshr-org-8024 133 15 doomed doom VBN blog-dshr-org-8024 133 16 to to TO blog-dshr-org-8024 133 17 fail fail VB blog-dshr-org-8024 133 18 , , , blog-dshr-org-8024 133 19 and and CC blog-dshr-org-8024 133 20 their -PRON- PRP$ blog-dshr-org-8024 133 21 failures failure NNS blog-dshr-org-8024 133 22 will will MD blog-dshr-org-8024 133 23 be be VB blog-dshr-org-8024 133 24 abrupt abrupt JJ blog-dshr-org-8024 133 25 and and CC blog-dshr-org-8024 133 26 complete complete JJ blog-dshr-org-8024 133 27 . . . blog-dshr-org-8024 134 1 It -PRON- PRP blog-dshr-org-8024 134 2 is be VBZ blog-dshr-org-8024 134 3 more more RBR blog-dshr-org-8024 134 4 important important JJ blog-dshr-org-8024 134 5 to to TO blog-dshr-org-8024 134 6 provide provide VB blog-dshr-org-8024 134 7 the the DT blog-dshr-org-8024 134 8 highest high JJS blog-dshr-org-8024 134 9 level level NN blog-dshr-org-8024 134 10 of of IN blog-dshr-org-8024 134 11 security security NN blog-dshr-org-8024 134 12 compatible compatible JJ blog-dshr-org-8024 134 13 with with IN blog-dshr-org-8024 134 14 resilience resilience NN blog-dshr-org-8024 134 15 , , , blog-dshr-org-8024 134 16 so so IN blog-dshr-org-8024 134 17 that that IN blog-dshr-org-8024 134 18 the the DT blog-dshr-org-8024 134 19 inevitable inevitable JJ blog-dshr-org-8024 134 20 failures failure NNS blog-dshr-org-8024 134 21 are be VBP blog-dshr-org-8024 134 22 contained contain VBN blog-dshr-org-8024 134 23 and and CC blog-dshr-org-8024 134 24 manageable manageable JJ blog-dshr-org-8024 134 25 . . . blog-dshr-org-8024 135 1 This this DT blog-dshr-org-8024 135 2 is be VBZ blog-dshr-org-8024 135 3 one one CD blog-dshr-org-8024 135 4 of of IN blog-dshr-org-8024 135 5 the the DT blog-dshr-org-8024 135 6 reasons reason NNS blog-dshr-org-8024 135 7 why why WRB blog-dshr-org-8024 135 8 permissionless permissionless NN blog-dshr-org-8024 135 9 blockchains blockchain NNS blog-dshr-org-8024 135 10 , , , blog-dshr-org-8024 135 11 subject subject JJ blog-dshr-org-8024 135 12 to to IN blog-dshr-org-8024 135 13 51 51 CD blog-dshr-org-8024 135 14 % % NN blog-dshr-org-8024 135 15 attacks attack NNS blog-dshr-org-8024 135 16 , , , blog-dshr-org-8024 135 17 and and CC blog-dshr-org-8024 135 18 permissioned permissione VBD blog-dshr-org-8024 135 19 blockchains blockchain NNS blog-dshr-org-8024 135 20 , , , blog-dshr-org-8024 135 21 with with IN blog-dshr-org-8024 135 22 a a DT blog-dshr-org-8024 135 23 single single JJ blog-dshr-org-8024 135 24 , , , blog-dshr-org-8024 135 25 central central JJ blog-dshr-org-8024 135 26 point point NN blog-dshr-org-8024 135 27 of of IN blog-dshr-org-8024 135 28 failure failure NN blog-dshr-org-8024 135 29 , , , blog-dshr-org-8024 135 30 are be VBP blog-dshr-org-8024 135 31 not not RB blog-dshr-org-8024 135 32 suitable suitable JJ blog-dshr-org-8024 135 33 . . . blog-dshr-org-8024 136 1 Software software NN blog-dshr-org-8024 136 2 Supply supply NN blog-dshr-org-8024 136 3 Chain chain NN blog-dshr-org-8024 136 4 [ [ -LRB- blog-dshr-org-8024 136 5 Slide slide NN blog-dshr-org-8024 136 6 9 9 CD blog-dshr-org-8024 136 7 ] ] -RRB- blog-dshr-org-8024 136 8 When when WRB blog-dshr-org-8024 136 9 the the DT blog-dshr-org-8024 136 10 mass mass JJ blog-dshr-org-8024 136 11 compromise compromise NN blog-dshr-org-8024 136 12 came come VBD blog-dshr-org-8024 136 13 to to IN blog-dshr-org-8024 136 14 light light NN blog-dshr-org-8024 136 15 last last JJ blog-dshr-org-8024 136 16 month month NN blog-dshr-org-8024 136 17 , , , blog-dshr-org-8024 136 18 Microsoft Microsoft NNP blog-dshr-org-8024 136 19 said say VBD blog-dshr-org-8024 136 20 the the DT blog-dshr-org-8024 136 21 hackers hacker NNS blog-dshr-org-8024 136 22 also also RB blog-dshr-org-8024 136 23 stole steal VBD blog-dshr-org-8024 136 24 signing signing NN blog-dshr-org-8024 136 25 certificates certificate NNS blog-dshr-org-8024 136 26 that that WDT blog-dshr-org-8024 136 27 allowed allow VBD blog-dshr-org-8024 136 28 them -PRON- PRP blog-dshr-org-8024 136 29 to to TO blog-dshr-org-8024 136 30 impersonate impersonate VB blog-dshr-org-8024 136 31 any any DT blog-dshr-org-8024 136 32 of of IN blog-dshr-org-8024 136 33 a a DT blog-dshr-org-8024 136 34 target target NN blog-dshr-org-8024 136 35 ’s ’s -LRB- blog-dshr-org-8024 136 36 existing exist VBG blog-dshr-org-8024 136 37 users user NNS blog-dshr-org-8024 136 38 and and CC blog-dshr-org-8024 136 39 accounts account VBZ blog-dshr-org-8024 136 40 through through IN blog-dshr-org-8024 136 41 the the DT blog-dshr-org-8024 136 42 Security Security NNP blog-dshr-org-8024 136 43 Assertion Assertion NNP blog-dshr-org-8024 136 44 Markup Markup NNP blog-dshr-org-8024 136 45 Language Language NNP blog-dshr-org-8024 136 46 . . . blog-dshr-org-8024 137 1 Typically typically RB blog-dshr-org-8024 137 2 abbreviated abbreviate VBN blog-dshr-org-8024 137 3 as as IN blog-dshr-org-8024 137 4 SAML SAML NNP blog-dshr-org-8024 137 5 , , , blog-dshr-org-8024 137 6 the the DT blog-dshr-org-8024 137 7 XML xml NN blog-dshr-org-8024 137 8 - - HYPH blog-dshr-org-8024 137 9 based base VBN blog-dshr-org-8024 137 10 language language NN blog-dshr-org-8024 137 11 provides provide VBZ blog-dshr-org-8024 137 12 a a DT blog-dshr-org-8024 137 13 way way NN blog-dshr-org-8024 137 14 for for IN blog-dshr-org-8024 137 15 identity identity NN blog-dshr-org-8024 137 16 providers provider NNS blog-dshr-org-8024 137 17 to to TO blog-dshr-org-8024 137 18 exchange exchange VB blog-dshr-org-8024 137 19 authentication authentication NN blog-dshr-org-8024 137 20 and and CC blog-dshr-org-8024 137 21 authorization authorization NN blog-dshr-org-8024 137 22 data datum NNS blog-dshr-org-8024 137 23 with with IN blog-dshr-org-8024 137 24 service service NN blog-dshr-org-8024 137 25 providers provider NNS blog-dshr-org-8024 137 26 . . . blog-dshr-org-8024 138 1 The the DT blog-dshr-org-8024 138 2 full full JJ blog-dshr-org-8024 138 3 impact impact NN blog-dshr-org-8024 138 4 of of IN blog-dshr-org-8024 138 5 the the DT blog-dshr-org-8024 138 6 recent recent JJ blog-dshr-org-8024 138 7 compromise compromise NN blog-dshr-org-8024 138 8 of of IN blog-dshr-org-8024 138 9 SolarWind SolarWind NNP blog-dshr-org-8024 138 10 's 's POS blog-dshr-org-8024 138 11 Orion Orion NNP blog-dshr-org-8024 138 12 network network NN blog-dshr-org-8024 138 13 management management NN blog-dshr-org-8024 138 14 software software NN blog-dshr-org-8024 138 15 will will MD blog-dshr-org-8024 138 16 likely likely RB blog-dshr-org-8024 138 17 never never RB blog-dshr-org-8024 138 18 be be VB blog-dshr-org-8024 138 19 known know VBN blog-dshr-org-8024 138 20 , , , blog-dshr-org-8024 138 21 It -PRON- PRP blog-dshr-org-8024 138 22 affected affect VBD blog-dshr-org-8024 138 23 at at IN blog-dshr-org-8024 138 24 least least JJS blog-dshr-org-8024 138 25 18,000 18,000 CD blog-dshr-org-8024 138 26 networks network NNS blog-dshr-org-8024 138 27 , , , blog-dshr-org-8024 138 28 including include VBG blog-dshr-org-8024 138 29 Microsoft Microsoft NNP blog-dshr-org-8024 138 30 's 's POS blog-dshr-org-8024 138 31 and and CC blog-dshr-org-8024 138 32 : : : blog-dshr-org-8024 138 33 the the DT blog-dshr-org-8024 138 34 Treasury Treasury NNP blog-dshr-org-8024 138 35 Department Department NNP blog-dshr-org-8024 138 36 , , , blog-dshr-org-8024 138 37 the the DT blog-dshr-org-8024 138 38 State State NNP blog-dshr-org-8024 138 39 Department Department NNP blog-dshr-org-8024 138 40 , , , blog-dshr-org-8024 138 41 the the DT blog-dshr-org-8024 138 42 Commerce Commerce NNP blog-dshr-org-8024 138 43 Department Department NNP blog-dshr-org-8024 138 44 , , , blog-dshr-org-8024 138 45 the the DT blog-dshr-org-8024 138 46 Energy Energy NNP blog-dshr-org-8024 138 47 Department Department NNP blog-dshr-org-8024 138 48 and and CC blog-dshr-org-8024 138 49 parts part NNS blog-dshr-org-8024 138 50 of of IN blog-dshr-org-8024 138 51 the the DT blog-dshr-org-8024 138 52 Pentagon Pentagon NNP blog-dshr-org-8024 138 53 It -PRON- PRP blog-dshr-org-8024 138 54 was be VBD blog-dshr-org-8024 138 55 not not RB blog-dshr-org-8024 138 56 detected detect VBN blog-dshr-org-8024 138 57 by by IN blog-dshr-org-8024 138 58 any any DT blog-dshr-org-8024 138 59 of of IN blog-dshr-org-8024 138 60 the the DT blog-dshr-org-8024 138 61 US US NNP blog-dshr-org-8024 138 62 government government NN blog-dshr-org-8024 138 63 's 's POS blog-dshr-org-8024 138 64 network network NN blog-dshr-org-8024 138 65 monitoring monitor VBG blog-dshr-org-8024 138 66 systems system NNS blog-dshr-org-8024 138 67 , , , blog-dshr-org-8024 138 68 but but CC blog-dshr-org-8024 138 69 by by IN blog-dshr-org-8024 138 70 FireEye FireEye NNP blog-dshr-org-8024 138 71 , , , blog-dshr-org-8024 138 72 a a DT blog-dshr-org-8024 138 73 computer computer NN blog-dshr-org-8024 138 74 security security NN blog-dshr-org-8024 138 75 company company NN blog-dshr-org-8024 138 76 that that WDT blog-dshr-org-8024 138 77 was be VBD blog-dshr-org-8024 138 78 also also RB blog-dshr-org-8024 138 79 a a DT blog-dshr-org-8024 138 80 victim victim NN blog-dshr-org-8024 138 81 . . . blog-dshr-org-8024 139 1 But but CC blog-dshr-org-8024 139 2 for for IN blog-dshr-org-8024 139 3 a a DT blog-dshr-org-8024 139 4 mistake mistake NN blog-dshr-org-8024 139 5 by by IN blog-dshr-org-8024 139 6 the the DT blog-dshr-org-8024 139 7 attackers attacker NNS blog-dshr-org-8024 139 8 at at IN blog-dshr-org-8024 139 9 FireEye FireEye NNP blog-dshr-org-8024 139 10 it -PRON- PRP blog-dshr-org-8024 139 11 would would MD blog-dshr-org-8024 139 12 still still RB blog-dshr-org-8024 139 13 be be VB blog-dshr-org-8024 139 14 undetected undetected JJ blog-dshr-org-8024 139 15 . . . blog-dshr-org-8024 140 1 It -PRON- PRP blog-dshr-org-8024 140 2 was be VBD blog-dshr-org-8024 140 3 an an DT blog-dshr-org-8024 140 4 extremely extremely RB blog-dshr-org-8024 140 5 sophisticated sophisticated JJ blog-dshr-org-8024 140 6 attack attack NN blog-dshr-org-8024 140 7 , , , blog-dshr-org-8024 140 8 which which WDT blog-dshr-org-8024 140 9 has have VBZ blog-dshr-org-8024 140 10 rightfully rightfully RB blog-dshr-org-8024 140 11 gained gain VBN blog-dshr-org-8024 140 12 a a DT blog-dshr-org-8024 140 13 lot lot NN blog-dshr-org-8024 140 14 of of IN blog-dshr-org-8024 140 15 attention attention NN blog-dshr-org-8024 140 16 . . . blog-dshr-org-8024 141 1 To to TO blog-dshr-org-8024 141 2 understand understand VB blog-dshr-org-8024 141 3 how how WRB blog-dshr-org-8024 141 4 defenses defense NNS blog-dshr-org-8024 141 5 against against IN blog-dshr-org-8024 141 6 attacks attack NNS blog-dshr-org-8024 141 7 like like IN blog-dshr-org-8024 141 8 this this DT blog-dshr-org-8024 141 9 might may MD blog-dshr-org-8024 141 10 work work VB blog-dshr-org-8024 141 11 , , , blog-dshr-org-8024 141 12 it -PRON- PRP blog-dshr-org-8024 141 13 is be VBZ blog-dshr-org-8024 141 14 first first RB blog-dshr-org-8024 141 15 necessary necessary JJ blog-dshr-org-8024 141 16 to to TO blog-dshr-org-8024 141 17 understand understand VB blog-dshr-org-8024 141 18 how how WRB blog-dshr-org-8024 141 19 the the DT blog-dshr-org-8024 141 20 supply supply NN blog-dshr-org-8024 141 21 chain chain NN blog-dshr-org-8024 141 22 that that IN blog-dshr-org-8024 141 23 installs install VBZ blog-dshr-org-8024 141 24 and and CC blog-dshr-org-8024 141 25 updates update VBZ blog-dshr-org-8024 141 26 the the DT blog-dshr-org-8024 141 27 software software NN blog-dshr-org-8024 141 28 on on IN blog-dshr-org-8024 141 29 your -PRON- PRP$ blog-dshr-org-8024 141 30 computer computer NN blog-dshr-org-8024 141 31 works work NNS blog-dshr-org-8024 141 32 . . . blog-dshr-org-8024 142 1 I -PRON- PRP blog-dshr-org-8024 142 2 'll will MD blog-dshr-org-8024 142 3 use use VB blog-dshr-org-8024 142 4 apt apt NN blog-dshr-org-8024 142 5 , , , blog-dshr-org-8024 142 6 the the DT blog-dshr-org-8024 142 7 system system NN blog-dshr-org-8024 142 8 used use VBN blog-dshr-org-8024 142 9 by by IN blog-dshr-org-8024 142 10 Debian Debian NNP blog-dshr-org-8024 142 11 Linux Linux NNP blog-dshr-org-8024 142 12 and and CC blog-dshr-org-8024 142 13 its -PRON- PRP$ blog-dshr-org-8024 142 14 derivatives derivative NNS blog-dshr-org-8024 142 15 , , , blog-dshr-org-8024 142 16 as as IN blog-dshr-org-8024 142 17 the the DT blog-dshr-org-8024 142 18 example example NN blog-dshr-org-8024 142 19 . . . blog-dshr-org-8024 143 1 A a DT blog-dshr-org-8024 143 2 system system NN blog-dshr-org-8024 143 3 running run VBG blog-dshr-org-8024 143 4 Debian debian NN blog-dshr-org-8024 143 5 or or CC blog-dshr-org-8024 143 6 another another DT blog-dshr-org-8024 143 7 APT apt NN blog-dshr-org-8024 143 8 - - HYPH blog-dshr-org-8024 143 9 based base VBN blog-dshr-org-8024 143 10 Linux Linux NNP blog-dshr-org-8024 143 11 distribution distribution NN blog-dshr-org-8024 143 12 runs run VBZ blog-dshr-org-8024 143 13 software software NN blog-dshr-org-8024 143 14 it -PRON- PRP blog-dshr-org-8024 143 15 received receive VBD blog-dshr-org-8024 143 16 in in IN blog-dshr-org-8024 143 17 " " `` blog-dshr-org-8024 143 18 packages package NNS blog-dshr-org-8024 143 19 " " '' blog-dshr-org-8024 143 20 that that WDT blog-dshr-org-8024 143 21 contain contain VBP blog-dshr-org-8024 143 22 the the DT blog-dshr-org-8024 143 23 software software NN blog-dshr-org-8024 143 24 files file NNS blog-dshr-org-8024 143 25 , , , blog-dshr-org-8024 143 26 and and CC blog-dshr-org-8024 143 27 metadata metadata NN blog-dshr-org-8024 143 28 that that WDT blog-dshr-org-8024 143 29 includes include VBZ blog-dshr-org-8024 143 30 dependencies dependency NNS blog-dshr-org-8024 143 31 . . . blog-dshr-org-8024 144 1 Their -PRON- PRP$ blog-dshr-org-8024 144 2 hashes hash NNS blog-dshr-org-8024 144 3 can can MD blog-dshr-org-8024 144 4 be be VB blog-dshr-org-8024 144 5 verified verify VBN blog-dshr-org-8024 144 6 against against IN blog-dshr-org-8024 144 7 those those DT blog-dshr-org-8024 144 8 in in IN blog-dshr-org-8024 144 9 a a DT blog-dshr-org-8024 144 10 release release NN blog-dshr-org-8024 144 11 file file NN blog-dshr-org-8024 144 12 , , , blog-dshr-org-8024 144 13 signed sign VBN blog-dshr-org-8024 144 14 by by IN blog-dshr-org-8024 144 15 the the DT blog-dshr-org-8024 144 16 distribution distribution NN blog-dshr-org-8024 144 17 publisher publisher NN blog-dshr-org-8024 144 18 . . . blog-dshr-org-8024 145 1 Packages package NNS blog-dshr-org-8024 145 2 come come VBP blog-dshr-org-8024 145 3 in in IN blog-dshr-org-8024 145 4 two two CD blog-dshr-org-8024 145 5 forms form NNS blog-dshr-org-8024 145 6 , , , blog-dshr-org-8024 145 7 source source NN blog-dshr-org-8024 145 8 and and CC blog-dshr-org-8024 145 9 compiled compile VBD blog-dshr-org-8024 145 10 . . . blog-dshr-org-8024 146 1 The the DT blog-dshr-org-8024 146 2 source source NN blog-dshr-org-8024 146 3 of of IN blog-dshr-org-8024 146 4 a a DT blog-dshr-org-8024 146 5 package package NN blog-dshr-org-8024 146 6 is be VBZ blog-dshr-org-8024 146 7 signed sign VBN blog-dshr-org-8024 146 8 by by IN blog-dshr-org-8024 146 9 the the DT blog-dshr-org-8024 146 10 official official JJ blog-dshr-org-8024 146 11 package package NN blog-dshr-org-8024 146 12 maintainer maintainer NN blog-dshr-org-8024 146 13 and and CC blog-dshr-org-8024 146 14 submitted submit VBN blog-dshr-org-8024 146 15 to to IN blog-dshr-org-8024 146 16 the the DT blog-dshr-org-8024 146 17 distribution distribution NN blog-dshr-org-8024 146 18 publisher publisher NN blog-dshr-org-8024 146 19 . . . blog-dshr-org-8024 147 1 The the DT blog-dshr-org-8024 147 2 publisher publisher NN blog-dshr-org-8024 147 3 verifies verify VBZ blog-dshr-org-8024 147 4 the the DT blog-dshr-org-8024 147 5 signature signature NN blog-dshr-org-8024 147 6 and and CC blog-dshr-org-8024 147 7 builds build VBZ blog-dshr-org-8024 147 8 the the DT blog-dshr-org-8024 147 9 source source NN blog-dshr-org-8024 147 10 to to TO blog-dshr-org-8024 147 11 form form VB blog-dshr-org-8024 147 12 the the DT blog-dshr-org-8024 147 13 compiled compile VBN blog-dshr-org-8024 147 14 package package NN blog-dshr-org-8024 147 15 , , , blog-dshr-org-8024 147 16 whose whose WP$ blog-dshr-org-8024 147 17 hashes hash NNS blog-dshr-org-8024 147 18 are be VBP blog-dshr-org-8024 147 19 then then RB blog-dshr-org-8024 147 20 included include VBN blog-dshr-org-8024 147 21 in in IN blog-dshr-org-8024 147 22 the the DT blog-dshr-org-8024 147 23 release release NN blog-dshr-org-8024 147 24 file file NN blog-dshr-org-8024 147 25 . . . blog-dshr-org-8024 148 1 The the DT blog-dshr-org-8024 148 2 signature signature NN blog-dshr-org-8024 148 3 on on IN blog-dshr-org-8024 148 4 the the DT blog-dshr-org-8024 148 5 source source NN blog-dshr-org-8024 148 6 package package NN blog-dshr-org-8024 148 7 verifies verifie NNS blog-dshr-org-8024 148 8 that that IN blog-dshr-org-8024 148 9 the the DT blog-dshr-org-8024 148 10 package package NN blog-dshr-org-8024 148 11 maintainer maintainer NN blog-dshr-org-8024 148 12 approves approve VBZ blog-dshr-org-8024 148 13 this this DT blog-dshr-org-8024 148 14 combination combination NN blog-dshr-org-8024 148 15 of of IN blog-dshr-org-8024 148 16 files file NNS blog-dshr-org-8024 148 17 for for IN blog-dshr-org-8024 148 18 the the DT blog-dshr-org-8024 148 19 distributor distributor NN blog-dshr-org-8024 148 20 to to TO blog-dshr-org-8024 148 21 build build VB blog-dshr-org-8024 148 22 . . . blog-dshr-org-8024 149 1 The the DT blog-dshr-org-8024 149 2 signature signature NN blog-dshr-org-8024 149 3 on on IN blog-dshr-org-8024 149 4 the the DT blog-dshr-org-8024 149 5 release release NN blog-dshr-org-8024 149 6 file file NN blog-dshr-org-8024 149 7 verifies verifie NNS blog-dshr-org-8024 149 8 that that IN blog-dshr-org-8024 149 9 the the DT blog-dshr-org-8024 149 10 distributor distributor NN blog-dshr-org-8024 149 11 built build VBD blog-dshr-org-8024 149 12 the the DT blog-dshr-org-8024 149 13 corresponding correspond VBG blog-dshr-org-8024 149 14 set set NN blog-dshr-org-8024 149 15 of of IN blog-dshr-org-8024 149 16 packages package NNS blog-dshr-org-8024 149 17 from from IN blog-dshr-org-8024 149 18 approved approve VBN blog-dshr-org-8024 149 19 sources source NNS blog-dshr-org-8024 149 20 and and CC blog-dshr-org-8024 149 21 that that IN blog-dshr-org-8024 149 22 the the DT blog-dshr-org-8024 149 23 combination combination NN blog-dshr-org-8024 149 24 is be VBZ blog-dshr-org-8024 149 25 approved approve VBN blog-dshr-org-8024 149 26 for for IN blog-dshr-org-8024 149 27 users user NNS blog-dshr-org-8024 149 28 to to TO blog-dshr-org-8024 149 29 install install VB blog-dshr-org-8024 149 30 . . . blog-dshr-org-8024 150 1 [ [ -LRB- blog-dshr-org-8024 150 2 Slide slide NN blog-dshr-org-8024 150 3 10 10 CD blog-dshr-org-8024 150 4 ] ] -RRB- blog-dshr-org-8024 150 5 There there EX blog-dshr-org-8024 150 6 are be VBP blog-dshr-org-8024 150 7 thus thus RB blog-dshr-org-8024 150 8 two two CD blog-dshr-org-8024 150 9 possible possible JJ blog-dshr-org-8024 150 10 points point NNS blog-dshr-org-8024 150 11 of of IN blog-dshr-org-8024 150 12 entry entry NN blog-dshr-org-8024 150 13 for for IN blog-dshr-org-8024 150 14 an an DT blog-dshr-org-8024 150 15 attacker attacker NN blog-dshr-org-8024 150 16 : : : blog-dshr-org-8024 150 17 They -PRON- PRP blog-dshr-org-8024 150 18 could could MD blog-dshr-org-8024 150 19 compromise compromise VB blog-dshr-org-8024 150 20 the the DT blog-dshr-org-8024 150 21 developer developer NN blog-dshr-org-8024 150 22 , , , blog-dshr-org-8024 150 23 so so IN blog-dshr-org-8024 150 24 that that IN blog-dshr-org-8024 150 25 the the DT blog-dshr-org-8024 150 26 signed sign VBN blog-dshr-org-8024 150 27 source source NN blog-dshr-org-8024 150 28 code code NN blog-dshr-org-8024 150 29 files file NNS blog-dshr-org-8024 150 30 received receive VBN blog-dshr-org-8024 150 31 by by IN blog-dshr-org-8024 150 32 the the DT blog-dshr-org-8024 150 33 distributor distributor NN blog-dshr-org-8024 150 34 contained contain VBD blog-dshr-org-8024 150 35 malware malware NNP blog-dshr-org-8024 150 36 ( ( -LRB- blog-dshr-org-8024 150 37 type type NN blog-dshr-org-8024 150 38 A A NNP blog-dshr-org-8024 150 39 ) ) -RRB- blog-dshr-org-8024 150 40 , , , blog-dshr-org-8024 150 41 Or or CC blog-dshr-org-8024 150 42 they -PRON- PRP blog-dshr-org-8024 150 43 could could MD blog-dshr-org-8024 150 44 compromise compromise VB blog-dshr-org-8024 150 45 the the DT blog-dshr-org-8024 150 46 distributor distributor NN blog-dshr-org-8024 150 47 , , , blog-dshr-org-8024 150 48 so so IN blog-dshr-org-8024 150 49 that that IN blog-dshr-org-8024 150 50 the the DT blog-dshr-org-8024 150 51 package package NN blog-dshr-org-8024 150 52 whose whose WP$ blog-dshr-org-8024 150 53 hash hash NN blog-dshr-org-8024 150 54 was be VBD blog-dshr-org-8024 150 55 in in IN blog-dshr-org-8024 150 56 the the DT blog-dshr-org-8024 150 57 signed signed JJ blog-dshr-org-8024 150 58 release release NN blog-dshr-org-8024 150 59 file file NN blog-dshr-org-8024 150 60 did do VBD blog-dshr-org-8024 150 61 not not RB blog-dshr-org-8024 150 62 reflect reflect VB blog-dshr-org-8024 150 63 the the DT blog-dshr-org-8024 150 64 signed sign VBN blog-dshr-org-8024 150 65 source source NN blog-dshr-org-8024 150 66 code code NN blog-dshr-org-8024 150 67 , , , blog-dshr-org-8024 150 68 but but CC blog-dshr-org-8024 150 69 contained contain VBD blog-dshr-org-8024 150 70 malware malware NNP blog-dshr-org-8024 150 71 ( ( -LRB- blog-dshr-org-8024 150 72 type type NNP blog-dshr-org-8024 150 73 B B NNP blog-dshr-org-8024 150 74 ) ) -RRB- blog-dshr-org-8024 150 75 . . . blog-dshr-org-8024 151 1 An an DT blog-dshr-org-8024 151 2 example example NN blog-dshr-org-8024 151 3 of of IN blog-dshr-org-8024 151 4 a a DT blog-dshr-org-8024 151 5 type type NN blog-dshr-org-8024 151 6 A a DT blog-dshr-org-8024 151 7 attack attack NN blog-dshr-org-8024 151 8 occurred occur VBD blog-dshr-org-8024 151 9 in in IN blog-dshr-org-8024 151 10 November November NNP blog-dshr-org-8024 151 11 2018 2018 CD blog-dshr-org-8024 151 12 . . . blog-dshr-org-8024 152 1 Dan Dan NNP blog-dshr-org-8024 152 2 Goodin Goodin NNP blog-dshr-org-8024 152 3 reported report VBD blog-dshr-org-8024 152 4 that that IN blog-dshr-org-8024 152 5 : : : blog-dshr-org-8024 152 6 The the DT blog-dshr-org-8024 152 7 malicious malicious JJ blog-dshr-org-8024 152 8 code code NN blog-dshr-org-8024 152 9 was be VBD blog-dshr-org-8024 152 10 inserted insert VBN blog-dshr-org-8024 152 11 in in IN blog-dshr-org-8024 152 12 two two CD blog-dshr-org-8024 152 13 stages stage NNS blog-dshr-org-8024 152 14 into into IN blog-dshr-org-8024 152 15 event event NN blog-dshr-org-8024 152 16 - - HYPH blog-dshr-org-8024 152 17 stream stream NN blog-dshr-org-8024 152 18 , , , blog-dshr-org-8024 152 19 a a DT blog-dshr-org-8024 152 20 code code NN blog-dshr-org-8024 152 21 library library NN blog-dshr-org-8024 152 22 with with IN blog-dshr-org-8024 152 23 2 2 CD blog-dshr-org-8024 152 24 million million CD blog-dshr-org-8024 152 25 downloads download NNS blog-dshr-org-8024 152 26 that that WDT blog-dshr-org-8024 152 27 's be VBZ blog-dshr-org-8024 152 28 used use VBN blog-dshr-org-8024 152 29 by by IN blog-dshr-org-8024 152 30 Fortune Fortune NNP blog-dshr-org-8024 152 31 500 500 CD blog-dshr-org-8024 152 32 companies company NNS blog-dshr-org-8024 152 33 and and CC blog-dshr-org-8024 152 34 small small JJ blog-dshr-org-8024 152 35 startups startup NNS blog-dshr-org-8024 152 36 alike alike RB blog-dshr-org-8024 152 37 . . . blog-dshr-org-8024 153 1 In in IN blog-dshr-org-8024 153 2 stage stage NN blog-dshr-org-8024 153 3 one one CD blog-dshr-org-8024 153 4 , , , blog-dshr-org-8024 153 5 version version NN blog-dshr-org-8024 153 6 3.3.6 3.3.6 CD blog-dshr-org-8024 153 7 , , , blog-dshr-org-8024 153 8 published publish VBN blog-dshr-org-8024 153 9 on on IN blog-dshr-org-8024 153 10 September September NNP blog-dshr-org-8024 153 11 8 8 CD blog-dshr-org-8024 153 12 , , , blog-dshr-org-8024 153 13 included include VBD blog-dshr-org-8024 153 14 a a DT blog-dshr-org-8024 153 15 benign benign JJ blog-dshr-org-8024 153 16 module module NN blog-dshr-org-8024 153 17 known know VBN blog-dshr-org-8024 153 18 as as IN blog-dshr-org-8024 153 19 flatmap flatmap NNP blog-dshr-org-8024 153 20 - - HYPH blog-dshr-org-8024 153 21 stream stream NN blog-dshr-org-8024 153 22 . . . blog-dshr-org-8024 154 1 Stage stage NN blog-dshr-org-8024 154 2 two two CD blog-dshr-org-8024 154 3 was be VBD blog-dshr-org-8024 154 4 implemented implement VBN blog-dshr-org-8024 154 5 on on IN blog-dshr-org-8024 154 6 October October NNP blog-dshr-org-8024 154 7 5 5 CD blog-dshr-org-8024 154 8 when when WRB blog-dshr-org-8024 154 9 flatmap flatmap NN blog-dshr-org-8024 154 10 - - HYPH blog-dshr-org-8024 154 11 stream stream NNP blog-dshr-org-8024 154 12 was be VBD blog-dshr-org-8024 154 13 updated update VBN blog-dshr-org-8024 154 14 to to TO blog-dshr-org-8024 154 15 include include VB blog-dshr-org-8024 154 16 malicious malicious JJ blog-dshr-org-8024 154 17 code code NN blog-dshr-org-8024 154 18 that that WDT blog-dshr-org-8024 154 19 attempted attempt VBD blog-dshr-org-8024 154 20 to to TO blog-dshr-org-8024 154 21 steal steal VB blog-dshr-org-8024 154 22 bitcoin bitcoin NN blog-dshr-org-8024 154 23 wallets wallet NNS blog-dshr-org-8024 154 24 and and CC blog-dshr-org-8024 154 25 transfer transfer VB blog-dshr-org-8024 154 26 their -PRON- PRP$ blog-dshr-org-8024 154 27 balances balance NNS blog-dshr-org-8024 154 28 to to IN blog-dshr-org-8024 154 29 a a DT blog-dshr-org-8024 154 30 server server NN blog-dshr-org-8024 154 31 located locate VBN blog-dshr-org-8024 154 32 in in IN blog-dshr-org-8024 154 33 Kuala Kuala NNP blog-dshr-org-8024 154 34 Lumpur Lumpur NNP blog-dshr-org-8024 154 35 . . . blog-dshr-org-8024 155 1 How how WRB blog-dshr-org-8024 155 2 were be VBD blog-dshr-org-8024 155 3 the the DT blog-dshr-org-8024 155 4 attackers attacker NNS blog-dshr-org-8024 155 5 able able JJ blog-dshr-org-8024 155 6 to to TO blog-dshr-org-8024 155 7 do do VB blog-dshr-org-8024 155 8 this this DT blog-dshr-org-8024 155 9 ? ? . blog-dshr-org-8024 156 1 Goodin Goodin NNP blog-dshr-org-8024 156 2 explains explain VBZ blog-dshr-org-8024 156 3 : : : blog-dshr-org-8024 156 4 According accord VBG blog-dshr-org-8024 156 5 to to IN blog-dshr-org-8024 156 6 the the DT blog-dshr-org-8024 156 7 Github Github NNP blog-dshr-org-8024 156 8 discussion discussion NN blog-dshr-org-8024 156 9 that that WDT blog-dshr-org-8024 156 10 exposed expose VBD blog-dshr-org-8024 156 11 the the DT blog-dshr-org-8024 156 12 backdoor backdoor NN blog-dshr-org-8024 156 13 , , , blog-dshr-org-8024 156 14 the the DT blog-dshr-org-8024 156 15 longtime longtime JJ blog-dshr-org-8024 156 16 event event NN blog-dshr-org-8024 156 17 - - HYPH blog-dshr-org-8024 156 18 stream stream NN blog-dshr-org-8024 156 19 developer developer NN blog-dshr-org-8024 156 20 no no RB blog-dshr-org-8024 156 21 longer longer RB blog-dshr-org-8024 156 22 had have VBD blog-dshr-org-8024 156 23 time time NN blog-dshr-org-8024 156 24 to to TO blog-dshr-org-8024 156 25 provide provide VB blog-dshr-org-8024 156 26 updates update NNS blog-dshr-org-8024 156 27 . . . blog-dshr-org-8024 157 1 So so RB blog-dshr-org-8024 157 2 several several JJ blog-dshr-org-8024 157 3 months month NNS blog-dshr-org-8024 157 4 ago ago RB blog-dshr-org-8024 157 5 , , , blog-dshr-org-8024 157 6 he -PRON- PRP blog-dshr-org-8024 157 7 accepted accept VBD blog-dshr-org-8024 157 8 the the DT blog-dshr-org-8024 157 9 help help NN blog-dshr-org-8024 157 10 of of IN blog-dshr-org-8024 157 11 an an DT blog-dshr-org-8024 157 12 unknown unknown JJ blog-dshr-org-8024 157 13 developer developer NN blog-dshr-org-8024 157 14 . . . blog-dshr-org-8024 158 1 The the DT blog-dshr-org-8024 158 2 new new JJ blog-dshr-org-8024 158 3 developer developer NN blog-dshr-org-8024 158 4 took take VBD blog-dshr-org-8024 158 5 care care NN blog-dshr-org-8024 158 6 to to TO blog-dshr-org-8024 158 7 keep keep VB blog-dshr-org-8024 158 8 the the DT blog-dshr-org-8024 158 9 backdoor backdoor NN blog-dshr-org-8024 158 10 from from IN blog-dshr-org-8024 158 11 being be VBG blog-dshr-org-8024 158 12 discovered discover VBN blog-dshr-org-8024 158 13 . . . blog-dshr-org-8024 159 1 Besides besides IN blog-dshr-org-8024 159 2 being be VBG blog-dshr-org-8024 159 3 gradually gradually RB blog-dshr-org-8024 159 4 implemented implement VBN blog-dshr-org-8024 159 5 in in IN blog-dshr-org-8024 159 6 stages stage NNS blog-dshr-org-8024 159 7 , , , blog-dshr-org-8024 159 8 it -PRON- PRP blog-dshr-org-8024 159 9 also also RB blog-dshr-org-8024 159 10 narrowly narrowly RB blog-dshr-org-8024 159 11 targeted target VBN blog-dshr-org-8024 159 12 only only RB blog-dshr-org-8024 159 13 the the DT blog-dshr-org-8024 159 14 Copay Copay NNP blog-dshr-org-8024 159 15 wallet wallet NN blog-dshr-org-8024 159 16 app app NN blog-dshr-org-8024 159 17 . . . blog-dshr-org-8024 160 1 The the DT blog-dshr-org-8024 160 2 malicious malicious JJ blog-dshr-org-8024 160 3 code code NN blog-dshr-org-8024 160 4 was be VBD blog-dshr-org-8024 160 5 also also RB blog-dshr-org-8024 160 6 hard hard JJ blog-dshr-org-8024 160 7 to to TO blog-dshr-org-8024 160 8 spot spot VB blog-dshr-org-8024 160 9 because because IN blog-dshr-org-8024 160 10 the the DT blog-dshr-org-8024 160 11 flatmap flatmap NN blog-dshr-org-8024 160 12 - - HYPH blog-dshr-org-8024 160 13 stream stream NN blog-dshr-org-8024 160 14 module module NN blog-dshr-org-8024 160 15 was be VBD blog-dshr-org-8024 160 16 encrypted encrypt VBN blog-dshr-org-8024 160 17 . . . blog-dshr-org-8024 161 1 All all DT blog-dshr-org-8024 161 2 that that WDT blog-dshr-org-8024 161 3 was be VBD blog-dshr-org-8024 161 4 needed need VBN blog-dshr-org-8024 161 5 to to TO blog-dshr-org-8024 161 6 implement implement VB blog-dshr-org-8024 161 7 this this DT blog-dshr-org-8024 161 8 type type NN blog-dshr-org-8024 161 9 A a DT blog-dshr-org-8024 161 10 attack attack NN blog-dshr-org-8024 161 11 was be VBD blog-dshr-org-8024 161 12 e e NN blog-dshr-org-8024 161 13 - - NN blog-dshr-org-8024 161 14 mail mail NN blog-dshr-org-8024 161 15 and and CC blog-dshr-org-8024 161 16 github github NNS blog-dshr-org-8024 161 17 accounts account NNS blog-dshr-org-8024 161 18 , , , blog-dshr-org-8024 161 19 and and CC blog-dshr-org-8024 161 20 some some DT blog-dshr-org-8024 161 21 social social JJ blog-dshr-org-8024 161 22 engineering engineering NN blog-dshr-org-8024 161 23 . . . blog-dshr-org-8024 162 1 Dan Dan NNP blog-dshr-org-8024 162 2 Goodin Goodin NNP blog-dshr-org-8024 162 3 describes describe VBZ blog-dshr-org-8024 162 4 a a DT blog-dshr-org-8024 162 5 simple simple JJ blog-dshr-org-8024 162 6 Type type NN blog-dshr-org-8024 162 7 B b NN blog-dshr-org-8024 162 8 attack attack NN blog-dshr-org-8024 162 9 in in IN blog-dshr-org-8024 162 10 New new JJ blog-dshr-org-8024 162 11 supply supply NN blog-dshr-org-8024 162 12 chain chain NN blog-dshr-org-8024 162 13 attack attack NN blog-dshr-org-8024 162 14 uses use VBZ blog-dshr-org-8024 162 15 poisoned poison VBN blog-dshr-org-8024 162 16 updates update NNS blog-dshr-org-8024 162 17 to to TO blog-dshr-org-8024 162 18 infect infect VB blog-dshr-org-8024 162 19 gamers gamer NNS blog-dshr-org-8024 162 20 ’ ’ POS blog-dshr-org-8024 162 21 computers computer NNS blog-dshr-org-8024 162 22 : : : blog-dshr-org-8024 162 23 In in IN blog-dshr-org-8024 162 24 a a DT blog-dshr-org-8024 162 25 nutshell nutshell NN blog-dshr-org-8024 162 26 , , , blog-dshr-org-8024 162 27 the the DT blog-dshr-org-8024 162 28 attack attack NN blog-dshr-org-8024 162 29 works work VBZ blog-dshr-org-8024 162 30 this this DT blog-dshr-org-8024 162 31 way way NN blog-dshr-org-8024 162 32 : : : blog-dshr-org-8024 162 33 on on IN blog-dshr-org-8024 162 34 launch launch NN blog-dshr-org-8024 162 35 , , , blog-dshr-org-8024 162 36 Nox.exe Nox.exe NNP blog-dshr-org-8024 162 37 sends send VBZ blog-dshr-org-8024 162 38 a a DT blog-dshr-org-8024 162 39 request request NN blog-dshr-org-8024 162 40 to to IN blog-dshr-org-8024 162 41 a a DT blog-dshr-org-8024 162 42 programming programming NN blog-dshr-org-8024 162 43 interface interface NN blog-dshr-org-8024 162 44 to to IN blog-dshr-org-8024 162 45 query query NN blog-dshr-org-8024 162 46 update update VB blog-dshr-org-8024 162 47 information information NN blog-dshr-org-8024 162 48 . . . blog-dshr-org-8024 163 1 The the DT blog-dshr-org-8024 163 2 BigNox BigNox NNP blog-dshr-org-8024 163 3 API API NNP blog-dshr-org-8024 163 4 server server NN blog-dshr-org-8024 163 5 responds respond VBZ blog-dshr-org-8024 163 6 with with IN blog-dshr-org-8024 163 7 update update NN blog-dshr-org-8024 163 8 information information NN blog-dshr-org-8024 163 9 that that WDT blog-dshr-org-8024 163 10 includes include VBZ blog-dshr-org-8024 163 11 a a DT blog-dshr-org-8024 163 12 URL url NN blog-dshr-org-8024 163 13 where where WRB blog-dshr-org-8024 163 14 the the DT blog-dshr-org-8024 163 15 legitimate legitimate JJ blog-dshr-org-8024 163 16 update update NN blog-dshr-org-8024 163 17 is be VBZ blog-dshr-org-8024 163 18 supposed suppose VBN blog-dshr-org-8024 163 19 to to TO blog-dshr-org-8024 163 20 be be VB blog-dshr-org-8024 163 21 available available JJ blog-dshr-org-8024 163 22 . . . blog-dshr-org-8024 164 1 Eset Eset NNP blog-dshr-org-8024 164 2 speculates speculate VBZ blog-dshr-org-8024 164 3 that that IN blog-dshr-org-8024 164 4 the the DT blog-dshr-org-8024 164 5 legitimate legitimate JJ blog-dshr-org-8024 164 6 update update NN blog-dshr-org-8024 164 7 may may MD blog-dshr-org-8024 164 8 have have VB blog-dshr-org-8024 164 9 been be VBN blog-dshr-org-8024 164 10 replaced replace VBN blog-dshr-org-8024 164 11 with with IN blog-dshr-org-8024 164 12 malware malware NNP blog-dshr-org-8024 164 13 or or CC blog-dshr-org-8024 164 14 , , , blog-dshr-org-8024 164 15 alternatively alternatively RB blog-dshr-org-8024 164 16 , , , blog-dshr-org-8024 164 17 a a DT blog-dshr-org-8024 164 18 new new JJ blog-dshr-org-8024 164 19 filename filename NN blog-dshr-org-8024 164 20 or or CC blog-dshr-org-8024 164 21 URL URL NNP blog-dshr-org-8024 164 22 was be VBD blog-dshr-org-8024 164 23 introduced introduce VBN blog-dshr-org-8024 164 24 . . . blog-dshr-org-8024 165 1 Malware Malware NNP blog-dshr-org-8024 165 2 is be VBZ blog-dshr-org-8024 165 3 then then RB blog-dshr-org-8024 165 4 installed instal VBN blog-dshr-org-8024 165 5 on on IN blog-dshr-org-8024 165 6 the the DT blog-dshr-org-8024 165 7 target target NN blog-dshr-org-8024 165 8 ’s ’s POS blog-dshr-org-8024 165 9 machine machine NN blog-dshr-org-8024 165 10 . . . blog-dshr-org-8024 166 1 The the DT blog-dshr-org-8024 166 2 malicious malicious JJ blog-dshr-org-8024 166 3 files file NNS blog-dshr-org-8024 166 4 are be VBP blog-dshr-org-8024 166 5 n’t not RB blog-dshr-org-8024 166 6 digitally digitally RB blog-dshr-org-8024 166 7 signed sign VBN blog-dshr-org-8024 166 8 the the DT blog-dshr-org-8024 166 9 way way NN blog-dshr-org-8024 166 10 legitimate legitimate JJ blog-dshr-org-8024 166 11 updates update NNS blog-dshr-org-8024 166 12 are be VBP blog-dshr-org-8024 166 13 . . . blog-dshr-org-8024 167 1 That that DT blog-dshr-org-8024 167 2 suggests suggest VBZ blog-dshr-org-8024 167 3 the the DT blog-dshr-org-8024 167 4 BigNox BigNox NNP blog-dshr-org-8024 167 5 software software NN blog-dshr-org-8024 167 6 build build NN blog-dshr-org-8024 167 7 system system NN blog-dshr-org-8024 167 8 is be VBZ blog-dshr-org-8024 167 9 n’t not RB blog-dshr-org-8024 167 10 compromised compromise VBN blog-dshr-org-8024 167 11 ; ; : blog-dshr-org-8024 167 12 only only RB blog-dshr-org-8024 167 13 the the DT blog-dshr-org-8024 167 14 systems system NNS blog-dshr-org-8024 167 15 for for IN blog-dshr-org-8024 167 16 delivering deliver VBG blog-dshr-org-8024 167 17 updates update NNS blog-dshr-org-8024 167 18 are be VBP blog-dshr-org-8024 167 19 . . . blog-dshr-org-8024 168 1 The the DT blog-dshr-org-8024 168 2 malware malware JJ blog-dshr-org-8024 168 3 performs perform VBZ blog-dshr-org-8024 168 4 limited limit VBN blog-dshr-org-8024 168 5 reconnaissance reconnaissance NN blog-dshr-org-8024 168 6 on on IN blog-dshr-org-8024 168 7 the the DT blog-dshr-org-8024 168 8 targeted target VBN blog-dshr-org-8024 168 9 computer computer NN blog-dshr-org-8024 168 10 . . . blog-dshr-org-8024 169 1 The the DT blog-dshr-org-8024 169 2 attackers attacker NNS blog-dshr-org-8024 169 3 further further RB blog-dshr-org-8024 169 4 tailor tailor VBP blog-dshr-org-8024 169 5 the the DT blog-dshr-org-8024 169 6 malicious malicious JJ blog-dshr-org-8024 169 7 updates update NNS blog-dshr-org-8024 169 8 to to IN blog-dshr-org-8024 169 9 specific specific JJ blog-dshr-org-8024 169 10 targets target NNS blog-dshr-org-8024 169 11 of of IN blog-dshr-org-8024 169 12 interest interest NN blog-dshr-org-8024 169 13 . . . blog-dshr-org-8024 170 1 [ [ -LRB- blog-dshr-org-8024 170 2 Slide slide NN blog-dshr-org-8024 170 3 11 11 CD blog-dshr-org-8024 170 4 ] ] -RRB- blog-dshr-org-8024 170 5 Source source NN blog-dshr-org-8024 170 6 The The NNP blog-dshr-org-8024 170 7 SolarWinds SolarWinds NNP blog-dshr-org-8024 170 8 attackers attacker NNS blog-dshr-org-8024 170 9 tried try VBD blog-dshr-org-8024 170 10 but but CC blog-dshr-org-8024 170 11 failed fail VBD blog-dshr-org-8024 170 12 to to TO blog-dshr-org-8024 170 13 penetrate penetrate VB blog-dshr-org-8024 170 14 the the DT blog-dshr-org-8024 170 15 network network NN blog-dshr-org-8024 170 16 of of IN blog-dshr-org-8024 170 17 Crowdstrike Crowdstrike NNP blog-dshr-org-8024 170 18 , , , blog-dshr-org-8024 170 19 another another DT blog-dshr-org-8024 170 20 computer computer NN blog-dshr-org-8024 170 21 security security NN blog-dshr-org-8024 170 22 company company NN blog-dshr-org-8024 170 23 . . . blog-dshr-org-8024 171 1 SUNSPOT SUNSPOT NNS blog-dshr-org-8024 171 2 : : : blog-dshr-org-8024 171 3 An an DT blog-dshr-org-8024 171 4 Implant Implant NNP blog-dshr-org-8024 171 5 in in IN blog-dshr-org-8024 171 6 the the DT blog-dshr-org-8024 171 7 Build Build NNP blog-dshr-org-8024 171 8 Process Process NNP blog-dshr-org-8024 171 9 , , , blog-dshr-org-8024 171 10 Crowdstrike Crowdstrike NNP blog-dshr-org-8024 171 11 's 's POS blog-dshr-org-8024 171 12 analysis analysis NN blog-dshr-org-8024 171 13 of of IN blog-dshr-org-8024 171 14 the the DT blog-dshr-org-8024 171 15 attack attack NN blog-dshr-org-8024 171 16 , , , blog-dshr-org-8024 171 17 reveals reveal VBZ blog-dshr-org-8024 171 18 the the DT blog-dshr-org-8024 171 19 much much RB blog-dshr-org-8024 171 20 greater great JJR blog-dshr-org-8024 171 21 sophistication sophistication NN blog-dshr-org-8024 171 22 of of IN blog-dshr-org-8024 171 23 this this DT blog-dshr-org-8024 171 24 Type Type NNP blog-dshr-org-8024 171 25 B B NNP blog-dshr-org-8024 171 26 attack attack NN blog-dshr-org-8024 171 27 . . . blog-dshr-org-8024 172 1 Once once RB blog-dshr-org-8024 172 2 implanted implant VBN blog-dshr-org-8024 172 3 in in IN blog-dshr-org-8024 172 4 SolarWinds SolarWinds NNP blog-dshr-org-8024 172 5 ' ' POS blog-dshr-org-8024 172 6 build build NN blog-dshr-org-8024 172 7 system system NN blog-dshr-org-8024 172 8 : : : blog-dshr-org-8024 172 9 SUNSPOT sunspot NN blog-dshr-org-8024 172 10 runs run VBZ blog-dshr-org-8024 172 11 once once RB blog-dshr-org-8024 172 12 a a DT blog-dshr-org-8024 172 13 second second JJ blog-dshr-org-8024 172 14 scanning scanning NN blog-dshr-org-8024 172 15 for for IN blog-dshr-org-8024 172 16 instances instance NNS blog-dshr-org-8024 172 17 of of IN blog-dshr-org-8024 172 18 MsBuild.exe msbuild.exe NN blog-dshr-org-8024 172 19 , , , blog-dshr-org-8024 172 20 the the DT blog-dshr-org-8024 172 21 tool tool NN blog-dshr-org-8024 172 22 used use VBD blog-dshr-org-8024 172 23 to to TO blog-dshr-org-8024 172 24 build build VB blog-dshr-org-8024 172 25 the the DT blog-dshr-org-8024 172 26 target target NN blog-dshr-org-8024 172 27 software software NN blog-dshr-org-8024 172 28 . . . blog-dshr-org-8024 173 1 If if IN blog-dshr-org-8024 173 2 SUNSPOT SUNSPOT NNP blog-dshr-org-8024 173 3 finds find VBZ blog-dshr-org-8024 173 4 an an DT blog-dshr-org-8024 173 5 MsBuild.exe msbuild.exe NN blog-dshr-org-8024 173 6 , , , blog-dshr-org-8024 173 7 it -PRON- PRP blog-dshr-org-8024 173 8 next next RB blog-dshr-org-8024 173 9 locates locate VBZ blog-dshr-org-8024 173 10 the the DT blog-dshr-org-8024 173 11 directory directory NN blog-dshr-org-8024 173 12 in in IN blog-dshr-org-8024 173 13 which which WDT blog-dshr-org-8024 173 14 the the DT blog-dshr-org-8024 173 15 build build NN blog-dshr-org-8024 173 16 is be VBZ blog-dshr-org-8024 173 17 running run VBG blog-dshr-org-8024 173 18 . . . blog-dshr-org-8024 174 1 Then then RB blog-dshr-org-8024 174 2 SUNSPOT SUNSPOT NNP blog-dshr-org-8024 174 3 checks check NNS blog-dshr-org-8024 174 4 whether whether IN blog-dshr-org-8024 174 5 what what WP blog-dshr-org-8024 174 6 is be VBZ blog-dshr-org-8024 174 7 being be VBG blog-dshr-org-8024 174 8 built build VBN blog-dshr-org-8024 174 9 is be VBZ blog-dshr-org-8024 174 10 the the DT blog-dshr-org-8024 174 11 target target NN blog-dshr-org-8024 174 12 software software NN blog-dshr-org-8024 174 13 . . . blog-dshr-org-8024 175 1 If if IN blog-dshr-org-8024 175 2 it -PRON- PRP blog-dshr-org-8024 175 3 is be VBZ blog-dshr-org-8024 175 4 , , , blog-dshr-org-8024 175 5 SUNSPOT SUNSPOT NNP blog-dshr-org-8024 175 6 checks check NNS blog-dshr-org-8024 175 7 whether whether IN blog-dshr-org-8024 175 8 the the DT blog-dshr-org-8024 175 9 target target NN blog-dshr-org-8024 175 10 source source NN blog-dshr-org-8024 175 11 file file NN blog-dshr-org-8024 175 12 has have VBZ blog-dshr-org-8024 175 13 changed change VBN blog-dshr-org-8024 175 14 . . . blog-dshr-org-8024 176 1 If if IN blog-dshr-org-8024 176 2 it -PRON- PRP blog-dshr-org-8024 176 3 has have VBZ blog-dshr-org-8024 176 4 n't not RB blog-dshr-org-8024 176 5 , , , blog-dshr-org-8024 176 6 SUNSPOT SUNSPOT NNP blog-dshr-org-8024 176 7 carefully carefully RB blog-dshr-org-8024 176 8 substitutes substitute VBZ blog-dshr-org-8024 176 9 the the DT blog-dshr-org-8024 176 10 modified modify VBN blog-dshr-org-8024 176 11 source source NN blog-dshr-org-8024 176 12 file file NN blog-dshr-org-8024 176 13 for for IN blog-dshr-org-8024 176 14 the the DT blog-dshr-org-8024 176 15 target target NN blog-dshr-org-8024 176 16 source source NN blog-dshr-org-8024 176 17 file file NN blog-dshr-org-8024 176 18 . . . blog-dshr-org-8024 177 1 SUNSPOT SUNSPOT NNP blog-dshr-org-8024 177 2 waits wait VBZ blog-dshr-org-8024 177 3 until until IN blog-dshr-org-8024 177 4 the the DT blog-dshr-org-8024 177 5 build build NN blog-dshr-org-8024 177 6 completes complete NNS blog-dshr-org-8024 177 7 , , , blog-dshr-org-8024 177 8 then then RB blog-dshr-org-8024 177 9 carefully carefully RB blog-dshr-org-8024 177 10 restores restore VBZ blog-dshr-org-8024 177 11 the the DT blog-dshr-org-8024 177 12 target target NN blog-dshr-org-8024 177 13 source source NN blog-dshr-org-8024 177 14 file file NN blog-dshr-org-8024 177 15 and and CC blog-dshr-org-8024 177 16 erases erase VBZ blog-dshr-org-8024 177 17 the the DT blog-dshr-org-8024 177 18 traces trace NNS blog-dshr-org-8024 177 19 of of IN blog-dshr-org-8024 177 20 its -PRON- PRP$ blog-dshr-org-8024 177 21 work work NN blog-dshr-org-8024 177 22 . . . blog-dshr-org-8024 178 1 SolarWinds SolarWinds NNP blog-dshr-org-8024 178 2 forensic forensic JJ blog-dshr-org-8024 178 3 timeline timeline NN blog-dshr-org-8024 178 4 shows show VBZ blog-dshr-org-8024 178 5 that that IN blog-dshr-org-8024 178 6 the the DT blog-dshr-org-8024 178 7 attackers attacker NNS blog-dshr-org-8024 178 8 penetrated penetrate VBD blog-dshr-org-8024 178 9 their -PRON- PRP$ blog-dshr-org-8024 178 10 network network NN blog-dshr-org-8024 178 11 in in IN blog-dshr-org-8024 178 12 September September NNP blog-dshr-org-8024 178 13 2019 2019 CD blog-dshr-org-8024 178 14 , , , blog-dshr-org-8024 178 15 and and CC blog-dshr-org-8024 178 16 a a DT blog-dshr-org-8024 178 17 month month NN blog-dshr-org-8024 178 18 later later RB blog-dshr-org-8024 178 19 tested test VBD blog-dshr-org-8024 178 20 SUNSPOT SUNSPOT NNP blog-dshr-org-8024 178 21 by by IN blog-dshr-org-8024 178 22 injecting inject VBG blog-dshr-org-8024 178 23 test test NN blog-dshr-org-8024 178 24 code code NN blog-dshr-org-8024 178 25 into into IN blog-dshr-org-8024 178 26 the the DT blog-dshr-org-8024 178 27 next next JJ blog-dshr-org-8024 178 28 release release NN blog-dshr-org-8024 178 29 of of IN blog-dshr-org-8024 178 30 Orion orion NN blog-dshr-org-8024 178 31 . . . blog-dshr-org-8024 179 1 An an DT blog-dshr-org-8024 179 2 improved improved JJ blog-dshr-org-8024 179 3 SUNSPOT SUNSPOT NNS blog-dshr-org-8024 179 4 was be VBD blog-dshr-org-8024 179 5 deployed deploy VBN blog-dshr-org-8024 179 6 from from IN blog-dshr-org-8024 179 7 February February NNP blog-dshr-org-8024 179 8 to to IN blog-dshr-org-8024 179 9 June June NNP blog-dshr-org-8024 179 10 , , , blog-dshr-org-8024 179 11 when when WRB blog-dshr-org-8024 179 12 it -PRON- PRP blog-dshr-org-8024 179 13 was be VBD blog-dshr-org-8024 179 14 removed remove VBN blog-dshr-org-8024 179 15 having have VBG blog-dshr-org-8024 179 16 successfully successfully RB blog-dshr-org-8024 179 17 compromised compromise VBN blog-dshr-org-8024 179 18 the the DT blog-dshr-org-8024 179 19 Orion Orion NNP blog-dshr-org-8024 179 20 release release NN blog-dshr-org-8024 179 21 with with IN blog-dshr-org-8024 179 22 the the DT blog-dshr-org-8024 179 23 production production NN blog-dshr-org-8024 179 24 malware malware NN blog-dshr-org-8024 179 25 . . . blog-dshr-org-8024 180 1 No no DT blog-dshr-org-8024 180 2 - - HYPH blog-dshr-org-8024 180 3 one one NN blog-dshr-org-8024 180 4 noticed notice VBD blog-dshr-org-8024 180 5 until until IN blog-dshr-org-8024 180 6 December December NNP blog-dshr-org-8024 180 7 , , , blog-dshr-org-8024 180 8 when when WRB blog-dshr-org-8024 180 9 FireEye FireEye NNP blog-dshr-org-8024 180 10 spotted spot VBD blog-dshr-org-8024 180 11 suspicious suspicious JJ blog-dshr-org-8024 180 12 activity activity NN blog-dshr-org-8024 180 13 on on IN blog-dshr-org-8024 180 14 their -PRON- PRP$ blog-dshr-org-8024 180 15 internal internal JJ blog-dshr-org-8024 180 16 network network NN blog-dshr-org-8024 180 17 and and CC blog-dshr-org-8024 180 18 traced trace VBD blog-dshr-org-8024 180 19 it -PRON- PRP blog-dshr-org-8024 180 20 to to IN blog-dshr-org-8024 180 21 Orion Orion NNP blog-dshr-org-8024 180 22 . . . blog-dshr-org-8024 181 1 Microsoft Microsoft NNP blog-dshr-org-8024 181 2 's 's POS blog-dshr-org-8024 181 3 analysis analysis NN blog-dshr-org-8024 181 4 reveals reveal VBZ blog-dshr-org-8024 181 5 a a DT blog-dshr-org-8024 181 6 lot lot NN blog-dshr-org-8024 181 7 more more JJR blog-dshr-org-8024 181 8 sophistication sophistication NN blog-dshr-org-8024 181 9 of of IN blog-dshr-org-8024 181 10 the the DT blog-dshr-org-8024 181 11 attacker attacker NN blog-dshr-org-8024 181 12 's 's POS blog-dshr-org-8024 181 13 operations operation NNS blog-dshr-org-8024 181 14 once once IN blog-dshr-org-8024 181 15 they -PRON- PRP blog-dshr-org-8024 181 16 had have VBD blog-dshr-org-8024 181 17 penetrated penetrate VBN blog-dshr-org-8024 181 18 the the DT blog-dshr-org-8024 181 19 network network NN blog-dshr-org-8024 181 20 : : : blog-dshr-org-8024 181 21 [ [ -LRB- blog-dshr-org-8024 181 22 Slide slide NN blog-dshr-org-8024 181 23 12 12 CD blog-dshr-org-8024 181 24 ] ] -RRB- blog-dshr-org-8024 181 25 Each each DT blog-dshr-org-8024 181 26 Cobalt Cobalt NNP blog-dshr-org-8024 181 27 Strike Strike NNP blog-dshr-org-8024 181 28 DLL DLL NNP blog-dshr-org-8024 181 29 implant implant NN blog-dshr-org-8024 181 30 was be VBD blog-dshr-org-8024 181 31 prepared prepared JJ blog-dshr-org-8024 181 32 to to TO blog-dshr-org-8024 181 33 be be VB blog-dshr-org-8024 181 34 unique unique JJ blog-dshr-org-8024 181 35 per per IN blog-dshr-org-8024 181 36 machine machine NN blog-dshr-org-8024 181 37 and and CC blog-dshr-org-8024 181 38 avoided avoid VBD blog-dshr-org-8024 181 39 at at IN blog-dshr-org-8024 181 40 any any DT blog-dshr-org-8024 181 41 cost cost NN blog-dshr-org-8024 181 42 overlap overlap NN blog-dshr-org-8024 181 43 and and CC blog-dshr-org-8024 181 44 reuse reuse NN blog-dshr-org-8024 181 45 of of IN blog-dshr-org-8024 181 46 folder folder NN blog-dshr-org-8024 181 47 name name NN blog-dshr-org-8024 181 48 , , , blog-dshr-org-8024 181 49 file file NN blog-dshr-org-8024 181 50 name name NN blog-dshr-org-8024 181 51 , , , blog-dshr-org-8024 181 52 export export NN blog-dshr-org-8024 181 53 function function NN blog-dshr-org-8024 181 54 names name NNS blog-dshr-org-8024 181 55 , , , blog-dshr-org-8024 181 56 C2 c2 NN blog-dshr-org-8024 181 57 domain domain NN blog-dshr-org-8024 181 58 / / SYM blog-dshr-org-8024 181 59 IP IP NNP blog-dshr-org-8024 181 60 , , , blog-dshr-org-8024 181 61 HTTP HTTP NNP blog-dshr-org-8024 181 62 requests request NNS blog-dshr-org-8024 181 63 , , , blog-dshr-org-8024 181 64 timestamp timestamp NN blog-dshr-org-8024 181 65 , , , blog-dshr-org-8024 181 66 file file NN blog-dshr-org-8024 181 67 metadata metadata NN blog-dshr-org-8024 181 68 , , , blog-dshr-org-8024 181 69 config config NN blog-dshr-org-8024 181 70 , , , blog-dshr-org-8024 181 71 and and CC blog-dshr-org-8024 181 72 child child NN blog-dshr-org-8024 181 73 process process NN blog-dshr-org-8024 181 74 launched launch VBD blog-dshr-org-8024 181 75 . . . blog-dshr-org-8024 182 1 This this DT blog-dshr-org-8024 182 2 extreme extreme JJ blog-dshr-org-8024 182 3 level level NN blog-dshr-org-8024 182 4 of of IN blog-dshr-org-8024 182 5 variance variance NN blog-dshr-org-8024 182 6 was be VBD blog-dshr-org-8024 182 7 also also RB blog-dshr-org-8024 182 8 applied apply VBN blog-dshr-org-8024 182 9 to to IN blog-dshr-org-8024 182 10 non non JJ blog-dshr-org-8024 182 11 - - JJ blog-dshr-org-8024 182 12 executable executable JJ blog-dshr-org-8024 182 13 entities entity NNS blog-dshr-org-8024 182 14 , , , blog-dshr-org-8024 182 15 such such JJ blog-dshr-org-8024 182 16 as as IN blog-dshr-org-8024 182 17 WMI WMI NNP blog-dshr-org-8024 182 18 persistence persistence NNP blog-dshr-org-8024 182 19 filter filter NN blog-dshr-org-8024 182 20 name name NN blog-dshr-org-8024 182 21 , , , blog-dshr-org-8024 182 22 WMI WMI NNP blog-dshr-org-8024 182 23 filter filter NN blog-dshr-org-8024 182 24 query query NN blog-dshr-org-8024 182 25 , , , blog-dshr-org-8024 182 26 passwords password NNS blog-dshr-org-8024 182 27 used use VBN blog-dshr-org-8024 182 28 for for IN blog-dshr-org-8024 182 29 7-zip 7-zip CD blog-dshr-org-8024 182 30 archives archive NNS blog-dshr-org-8024 182 31 , , , blog-dshr-org-8024 182 32 and and CC blog-dshr-org-8024 182 33 names name NNS blog-dshr-org-8024 182 34 of of IN blog-dshr-org-8024 182 35 output output NN blog-dshr-org-8024 182 36 log log NN blog-dshr-org-8024 182 37 files file NNS blog-dshr-org-8024 182 38 . . . blog-dshr-org-8024 183 1 How how WRB blog-dshr-org-8024 183 2 could could MD blog-dshr-org-8024 183 3 software software VB blog-dshr-org-8024 183 4 supply supply NN blog-dshr-org-8024 183 5 chains chain NNS blog-dshr-org-8024 183 6 be be VB blog-dshr-org-8024 183 7 enhanced enhance VBN blog-dshr-org-8024 183 8 to to TO blog-dshr-org-8024 183 9 resist resist VB blog-dshr-org-8024 183 10 these these DT blog-dshr-org-8024 183 11 attacks attack NNS blog-dshr-org-8024 183 12 ? ? . blog-dshr-org-8024 184 1 In in IN blog-dshr-org-8024 184 2 an an DT blog-dshr-org-8024 184 3 important important JJ blog-dshr-org-8024 184 4 paper paper NN blog-dshr-org-8024 184 5 entitled entitle VBN blog-dshr-org-8024 184 6 Software Software NNP blog-dshr-org-8024 184 7 Distribution Distribution NNP blog-dshr-org-8024 184 8 Transparency Transparency NNP blog-dshr-org-8024 184 9 and and CC blog-dshr-org-8024 184 10 Auditability Auditability NNP blog-dshr-org-8024 184 11 , , , blog-dshr-org-8024 184 12 Benjamin Benjamin NNP blog-dshr-org-8024 184 13 Hof Hof NNP blog-dshr-org-8024 184 14 and and CC blog-dshr-org-8024 184 15 Georg Georg NNP blog-dshr-org-8024 184 16 Carle Carle NNP blog-dshr-org-8024 184 17 from from IN blog-dshr-org-8024 184 18 TU TU NNP blog-dshr-org-8024 184 19 Munich Munich NNP blog-dshr-org-8024 184 20 : : : blog-dshr-org-8024 184 21 Describe describe VB blog-dshr-org-8024 184 22 how how WRB blog-dshr-org-8024 184 23 APT apt JJ blog-dshr-org-8024 184 24 works work NNS blog-dshr-org-8024 184 25 to to TO blog-dshr-org-8024 184 26 maintain maintain VB blog-dshr-org-8024 184 27 up up RB blog-dshr-org-8024 184 28 - - HYPH blog-dshr-org-8024 184 29 to to IN blog-dshr-org-8024 184 30 - - HYPH blog-dshr-org-8024 184 31 date date NN blog-dshr-org-8024 184 32 software software NN blog-dshr-org-8024 184 33 on on IN blog-dshr-org-8024 184 34 clients client NNS blog-dshr-org-8024 184 35 by by IN blog-dshr-org-8024 184 36 distributing distribute VBG blog-dshr-org-8024 184 37 signed sign VBN blog-dshr-org-8024 184 38 packages package NNS blog-dshr-org-8024 184 39 . . . blog-dshr-org-8024 185 1 Review review VB blog-dshr-org-8024 185 2 previous previous JJ blog-dshr-org-8024 185 3 efforts effort NNS blog-dshr-org-8024 185 4 to to TO blog-dshr-org-8024 185 5 improve improve VB blog-dshr-org-8024 185 6 the the DT blog-dshr-org-8024 185 7 security security NN blog-dshr-org-8024 185 8 of of IN blog-dshr-org-8024 185 9 this this DT blog-dshr-org-8024 185 10 process process NN blog-dshr-org-8024 185 11 . . . blog-dshr-org-8024 186 1 Propose propose VB blog-dshr-org-8024 186 2 to to TO blog-dshr-org-8024 186 3 enhance enhance VB blog-dshr-org-8024 186 4 APT APT NNP blog-dshr-org-8024 186 5 's 's POS blog-dshr-org-8024 186 6 security security NN blog-dshr-org-8024 186 7 by by IN blog-dshr-org-8024 186 8 layering layer VBG blog-dshr-org-8024 186 9 a a DT blog-dshr-org-8024 186 10 system system NN blog-dshr-org-8024 186 11 similar similar JJ blog-dshr-org-8024 186 12 to to IN blog-dshr-org-8024 186 13 Certificate Certificate NNP blog-dshr-org-8024 186 14 Transparency Transparency NNP blog-dshr-org-8024 186 15 ( ( -LRB- blog-dshr-org-8024 186 16 CT CT NNP blog-dshr-org-8024 186 17 ) ) -RRB- blog-dshr-org-8024 186 18 on on IN blog-dshr-org-8024 186 19 top top NN blog-dshr-org-8024 186 20 . . . blog-dshr-org-8024 187 1 Detail detail VB blog-dshr-org-8024 187 2 the the DT blog-dshr-org-8024 187 3 operation operation NN blog-dshr-org-8024 187 4 of of IN blog-dshr-org-8024 187 5 their -PRON- PRP$ blog-dshr-org-8024 187 6 systems system NNS blog-dshr-org-8024 187 7 ' ' POS blog-dshr-org-8024 187 8 logs log NNS blog-dshr-org-8024 187 9 , , , blog-dshr-org-8024 187 10 auditors auditor NNS blog-dshr-org-8024 187 11 and and CC blog-dshr-org-8024 187 12 monitors monitor NNS blog-dshr-org-8024 187 13 , , , blog-dshr-org-8024 187 14 which which WDT blog-dshr-org-8024 187 15 are be VBP blog-dshr-org-8024 187 16 similar similar JJ blog-dshr-org-8024 187 17 to to IN blog-dshr-org-8024 187 18 CT CT NNP blog-dshr-org-8024 187 19 's 's POS blog-dshr-org-8024 187 20 in in IN blog-dshr-org-8024 187 21 principle principle NN blog-dshr-org-8024 187 22 but but CC blog-dshr-org-8024 187 23 different different JJ blog-dshr-org-8024 187 24 in in IN blog-dshr-org-8024 187 25 detail detail NN blog-dshr-org-8024 187 26 . . . blog-dshr-org-8024 188 1 Describe describe VB blog-dshr-org-8024 188 2 and and CC blog-dshr-org-8024 188 3 measure measure VB blog-dshr-org-8024 188 4 the the DT blog-dshr-org-8024 188 5 performance performance NN blog-dshr-org-8024 188 6 of of IN blog-dshr-org-8024 188 7 an an DT blog-dshr-org-8024 188 8 implementation implementation NN blog-dshr-org-8024 188 9 of of IN blog-dshr-org-8024 188 10 their -PRON- PRP$ blog-dshr-org-8024 188 11 layer layer NN blog-dshr-org-8024 188 12 on on IN blog-dshr-org-8024 188 13 top top NN blog-dshr-org-8024 188 14 of of IN blog-dshr-org-8024 188 15 APT apt NN blog-dshr-org-8024 188 16 using use VBG blog-dshr-org-8024 188 17 the the DT blog-dshr-org-8024 188 18 Trillian trillian JJ blog-dshr-org-8024 188 19 software software NN blog-dshr-org-8024 188 20 underlying underlie VBG blog-dshr-org-8024 188 21 some some DT blog-dshr-org-8024 188 22 CT CT NNP blog-dshr-org-8024 188 23 implementations implementation NNS blog-dshr-org-8024 188 24 . . . blog-dshr-org-8024 189 1 Their -PRON- PRP$ blog-dshr-org-8024 189 2 system system NN blog-dshr-org-8024 189 3 's 's POS blog-dshr-org-8024 189 4 CT ct NN blog-dshr-org-8024 189 5 - - HYPH blog-dshr-org-8024 189 6 like like JJ blog-dshr-org-8024 189 7 logs log NNS blog-dshr-org-8024 189 8 contain contain VBP blog-dshr-org-8024 189 9 the the DT blog-dshr-org-8024 189 10 hashes hash NNS blog-dshr-org-8024 189 11 of of IN blog-dshr-org-8024 189 12 both both DT blog-dshr-org-8024 189 13 the the DT blog-dshr-org-8024 189 14 source source NN blog-dshr-org-8024 189 15 and and CC blog-dshr-org-8024 189 16 the the DT blog-dshr-org-8024 189 17 binaries binary NNS blog-dshr-org-8024 189 18 of of IN blog-dshr-org-8024 189 19 each each DT blog-dshr-org-8024 189 20 version version NN blog-dshr-org-8024 189 21 of of IN blog-dshr-org-8024 189 22 each each DT blog-dshr-org-8024 189 23 package package NN blog-dshr-org-8024 189 24 , , , blog-dshr-org-8024 189 25 and and CC blog-dshr-org-8024 189 26 ensure ensure VB blog-dshr-org-8024 189 27 that that IN blog-dshr-org-8024 189 28 attackers attacker NNS blog-dshr-org-8024 189 29 would would MD blog-dshr-org-8024 189 30 be be VB blog-dshr-org-8024 189 31 detected detect VBN blog-dshr-org-8024 189 32 if if IN blog-dshr-org-8024 189 33 they -PRON- PRP blog-dshr-org-8024 189 34 , , , blog-dshr-org-8024 189 35 for for IN blog-dshr-org-8024 189 36 example example NN blog-dshr-org-8024 189 37 , , , blog-dshr-org-8024 189 38 create create VB blog-dshr-org-8024 189 39 a a DT blog-dshr-org-8024 189 40 short short RB blog-dshr-org-8024 189 41 - - HYPH blog-dshr-org-8024 189 42 lived live VBN blog-dshr-org-8024 189 43 version version NN blog-dshr-org-8024 189 44 containing contain VBG blog-dshr-org-8024 189 45 malware malware NNP blog-dshr-org-8024 189 46 for for IN blog-dshr-org-8024 189 47 a a DT blog-dshr-org-8024 189 48 specific specific JJ blog-dshr-org-8024 189 49 victim victim NN blog-dshr-org-8024 189 50 . . . blog-dshr-org-8024 190 1 It -PRON- PRP blog-dshr-org-8024 190 2 certainly certainly RB blog-dshr-org-8024 190 3 defeats defeat VBZ blog-dshr-org-8024 190 4 a a DT blog-dshr-org-8024 190 5 significant significant JJ blog-dshr-org-8024 190 6 class class NN blog-dshr-org-8024 190 7 of of IN blog-dshr-org-8024 190 8 attacks attack NNS blog-dshr-org-8024 190 9 but but CC blog-dshr-org-8024 190 10 , , , blog-dshr-org-8024 190 11 alas alas UH blog-dshr-org-8024 190 12 , , , blog-dshr-org-8024 190 13 does do VBZ blog-dshr-org-8024 190 14 not not RB blog-dshr-org-8024 190 15 address address VB blog-dshr-org-8024 190 16 either either CC blog-dshr-org-8024 190 17 the the DT blog-dshr-org-8024 190 18 SolarWinds SolarWinds NNP blog-dshr-org-8024 190 19 or or CC blog-dshr-org-8024 190 20 the the DT blog-dshr-org-8024 190 21 event event NN blog-dshr-org-8024 190 22 - - HYPH blog-dshr-org-8024 190 23 stream stream NN blog-dshr-org-8024 190 24 attacks attack NNS blog-dshr-org-8024 190 25 . . . blog-dshr-org-8024 191 1 As as IN blog-dshr-org-8024 191 2 regards regard VBZ blog-dshr-org-8024 191 3 the the DT blog-dshr-org-8024 191 4 SolarWinds SolarWinds NNP blog-dshr-org-8024 191 5 attack attack NN blog-dshr-org-8024 191 6 , , , blog-dshr-org-8024 191 7 there there EX blog-dshr-org-8024 191 8 are be VBP blog-dshr-org-8024 191 9 two two CD blog-dshr-org-8024 191 10 important important JJ blog-dshr-org-8024 191 11 " " '' blog-dshr-org-8024 191 12 missing miss VBG blog-dshr-org-8024 191 13 pieces piece NNS blog-dshr-org-8024 191 14 " " '' blog-dshr-org-8024 191 15 in in IN blog-dshr-org-8024 191 16 their -PRON- PRP$ blog-dshr-org-8024 191 17 system system NN blog-dshr-org-8024 191 18 , , , blog-dshr-org-8024 191 19 and and CC blog-dshr-org-8024 191 20 all all PDT blog-dshr-org-8024 191 21 the the DT blog-dshr-org-8024 191 22 predecessors predecessor NNS blog-dshr-org-8024 191 23 . . . blog-dshr-org-8024 192 1 Each each DT blog-dshr-org-8024 192 2 is be VBZ blog-dshr-org-8024 192 3 the the DT blog-dshr-org-8024 192 4 subject subject NN blog-dshr-org-8024 192 5 of of IN blog-dshr-org-8024 192 6 a a DT blog-dshr-org-8024 192 7 separate separate JJ blog-dshr-org-8024 192 8 effort effort NN blog-dshr-org-8024 192 9 : : : blog-dshr-org-8024 192 10 [ [ -LRB- blog-dshr-org-8024 192 11 Slide slide NN blog-dshr-org-8024 192 12 13 13 CD blog-dshr-org-8024 192 13 ] ] -RRB- blog-dshr-org-8024 192 14 Reproducible Reproducible NNP blog-dshr-org-8024 192 15 Builds Builds NNP blog-dshr-org-8024 192 16 . . . blog-dshr-org-8024 193 1 Bootstrappable Bootstrappable NNP blog-dshr-org-8024 193 2 Compilers Compilers NNPS blog-dshr-org-8024 193 3 . . . blog-dshr-org-8024 194 1 Suppose Suppose NNP blog-dshr-org-8024 194 2 SolarWinds SolarWinds NNP blog-dshr-org-8024 194 3 had have VBD blog-dshr-org-8024 194 4 been be VBN blog-dshr-org-8024 194 5 working work VBG blog-dshr-org-8024 194 6 in in IN blog-dshr-org-8024 194 7 Hof Hof NNP blog-dshr-org-8024 194 8 and and CC blog-dshr-org-8024 194 9 Carle Carle NNP blog-dshr-org-8024 194 10 's 's POS blog-dshr-org-8024 194 11 system system NN blog-dshr-org-8024 194 12 . . . blog-dshr-org-8024 195 1 They -PRON- PRP blog-dshr-org-8024 195 2 would would MD blog-dshr-org-8024 195 3 have have VB blog-dshr-org-8024 195 4 signed sign VBN blog-dshr-org-8024 195 5 their -PRON- PRP$ blog-dshr-org-8024 195 6 source source NN blog-dshr-org-8024 195 7 code code NN blog-dshr-org-8024 195 8 , , , blog-dshr-org-8024 195 9 built build VBD blog-dshr-org-8024 195 10 it -PRON- PRP blog-dshr-org-8024 195 11 , , , blog-dshr-org-8024 195 12 and and CC blog-dshr-org-8024 195 13 signed sign VBD blog-dshr-org-8024 195 14 the the DT blog-dshr-org-8024 195 15 resulting result VBG blog-dshr-org-8024 195 16 binaries binary NNS blog-dshr-org-8024 195 17 . . . blog-dshr-org-8024 196 1 The the DT blog-dshr-org-8024 196 2 attackers attacker NNS blog-dshr-org-8024 196 3 would would MD blog-dshr-org-8024 196 4 have have VB blog-dshr-org-8024 196 5 arranged arrange VBN blog-dshr-org-8024 196 6 that that IN blog-dshr-org-8024 196 7 the the DT blog-dshr-org-8024 196 8 source source NN blog-dshr-org-8024 196 9 that that WDT blog-dshr-org-8024 196 10 was be VBD blog-dshr-org-8024 196 11 built build VBN blog-dshr-org-8024 196 12 was be VBD blog-dshr-org-8024 196 13 not not RB blog-dshr-org-8024 196 14 the the DT blog-dshr-org-8024 196 15 source source NN blog-dshr-org-8024 196 16 that that WDT blog-dshr-org-8024 196 17 SolarWinds SolarWinds NNP blog-dshr-org-8024 196 18 signed sign VBD blog-dshr-org-8024 196 19 , , , blog-dshr-org-8024 196 20 but but CC blog-dshr-org-8024 196 21 SolarWinds SolarWinds NNP blog-dshr-org-8024 196 22 would would MD blog-dshr-org-8024 196 23 not not RB blog-dshr-org-8024 196 24 have have VB blog-dshr-org-8024 196 25 known know VBN blog-dshr-org-8024 196 26 that that DT blog-dshr-org-8024 196 27 . . . blog-dshr-org-8024 197 1 So so RB blog-dshr-org-8024 197 2 the the DT blog-dshr-org-8024 197 3 signatures signature NNS blog-dshr-org-8024 197 4 on on IN blog-dshr-org-8024 197 5 both both CC blog-dshr-org-8024 197 6 the the DT blog-dshr-org-8024 197 7 unmodified unmodified JJ blog-dshr-org-8024 197 8 source source NN blog-dshr-org-8024 197 9 and and CC blog-dshr-org-8024 197 10 the the DT blog-dshr-org-8024 197 11 modified modify VBN blog-dshr-org-8024 197 12 binaries binary NNS blog-dshr-org-8024 197 13 would would MD blog-dshr-org-8024 197 14 appear appear VB blog-dshr-org-8024 197 15 valid valid JJ blog-dshr-org-8024 197 16 in in IN blog-dshr-org-8024 197 17 the the DT blog-dshr-org-8024 197 18 logs log NNS blog-dshr-org-8024 197 19 , , , blog-dshr-org-8024 197 20 but but CC blog-dshr-org-8024 197 21 the the DT blog-dshr-org-8024 197 22 binaries binary NNS blog-dshr-org-8024 197 23 would would MD blog-dshr-org-8024 197 24 be be VB blog-dshr-org-8024 197 25 malign malign JJ blog-dshr-org-8024 197 26 . . . blog-dshr-org-8024 198 1 The the DT blog-dshr-org-8024 198 2 problem problem NN blog-dshr-org-8024 198 3 is be VBZ blog-dshr-org-8024 198 4 that that IN blog-dshr-org-8024 198 5 the the DT blog-dshr-org-8024 198 6 connection connection NN blog-dshr-org-8024 198 7 between between IN blog-dshr-org-8024 198 8 the the DT blog-dshr-org-8024 198 9 source source NN blog-dshr-org-8024 198 10 and and CC blog-dshr-org-8024 198 11 the the DT blog-dshr-org-8024 198 12 binaries binary NNS blog-dshr-org-8024 198 13 rests rest VBZ blog-dshr-org-8024 198 14 on on IN blog-dshr-org-8024 198 15 an an DT blog-dshr-org-8024 198 16 assumption assumption NN blog-dshr-org-8024 198 17 that that IN blog-dshr-org-8024 198 18 the the DT blog-dshr-org-8024 198 19 distributor distributor NN blog-dshr-org-8024 198 20 's 's POS blog-dshr-org-8024 198 21 build build NN blog-dshr-org-8024 198 22 environment environment NN blog-dshr-org-8024 198 23 has have VBZ blog-dshr-org-8024 198 24 not not RB blog-dshr-org-8024 198 25 been be VBN blog-dshr-org-8024 198 26 compromised compromise VBN blog-dshr-org-8024 198 27 - - HYPH blog-dshr-org-8024 198 28 i.e. i.e. FW blog-dshr-org-8024 199 1 no no DT blog-dshr-org-8024 199 2 type type NN blog-dshr-org-8024 199 3 B b NN blog-dshr-org-8024 199 4 attack attack NN blog-dshr-org-8024 199 5 . . . blog-dshr-org-8024 200 1 As as IN blog-dshr-org-8024 200 2 with with IN blog-dshr-org-8024 200 3 the the DT blog-dshr-org-8024 200 4 multiple multiple JJ blog-dshr-org-8024 200 5 logs log NNS blog-dshr-org-8024 200 6 of of IN blog-dshr-org-8024 200 7 CT CT NNP blog-dshr-org-8024 200 8 , , , blog-dshr-org-8024 200 9 what what WP blog-dshr-org-8024 200 10 is be VBZ blog-dshr-org-8024 200 11 needed need VBN blog-dshr-org-8024 200 12 is be VBZ blog-dshr-org-8024 200 13 multiple multiple JJ blog-dshr-org-8024 200 14 independent independent JJ blog-dshr-org-8024 200 15 builds build NNS blog-dshr-org-8024 200 16 of of IN blog-dshr-org-8024 200 17 the the DT blog-dshr-org-8024 200 18 signed sign VBN blog-dshr-org-8024 200 19 source source NN blog-dshr-org-8024 200 20 . . . blog-dshr-org-8024 201 1 Unless unless IN blog-dshr-org-8024 201 2 all all DT blog-dshr-org-8024 201 3 of of IN blog-dshr-org-8024 201 4 the the DT blog-dshr-org-8024 201 5 independent independent JJ blog-dshr-org-8024 201 6 build build NN blog-dshr-org-8024 201 7 environments environment NNS blog-dshr-org-8024 201 8 are be VBP blog-dshr-org-8024 201 9 compromised compromise VBN blog-dshr-org-8024 201 10 , , , blog-dshr-org-8024 201 11 a a DT blog-dshr-org-8024 201 12 compromised compromised JJ blog-dshr-org-8024 201 13 build build NN blog-dshr-org-8024 201 14 will will MD blog-dshr-org-8024 201 15 differ differ VB blog-dshr-org-8024 201 16 from from IN blog-dshr-org-8024 201 17 the the DT blog-dshr-org-8024 201 18 others other NNS blog-dshr-org-8024 201 19 because because IN blog-dshr-org-8024 201 20 it -PRON- PRP blog-dshr-org-8024 201 21 contains contain VBZ blog-dshr-org-8024 201 22 malware malware NNP blog-dshr-org-8024 201 23 . . . blog-dshr-org-8024 202 1 This this DT blog-dshr-org-8024 202 2 is be VBZ blog-dshr-org-8024 202 3 a a DT blog-dshr-org-8024 202 4 great great JJ blog-dshr-org-8024 202 5 idea idea NN blog-dshr-org-8024 202 6 , , , blog-dshr-org-8024 202 7 but but CC blog-dshr-org-8024 202 8 in in IN blog-dshr-org-8024 202 9 practice practice NN blog-dshr-org-8024 202 10 it -PRON- PRP blog-dshr-org-8024 202 11 is be VBZ blog-dshr-org-8024 202 12 very very RB blog-dshr-org-8024 202 13 hard hard JJ blog-dshr-org-8024 202 14 to to TO blog-dshr-org-8024 202 15 achieve achieve VB blog-dshr-org-8024 202 16 for for IN blog-dshr-org-8024 202 17 both both CC blog-dshr-org-8024 202 18 technical technical JJ blog-dshr-org-8024 202 19 and and CC blog-dshr-org-8024 202 20 organizational organizational JJ blog-dshr-org-8024 202 21 reasons reason NNS blog-dshr-org-8024 202 22 : : : blog-dshr-org-8024 202 23 The the DT blog-dshr-org-8024 202 24 first first JJ blog-dshr-org-8024 202 25 technical technical JJ blog-dshr-org-8024 202 26 reason reason NN blog-dshr-org-8024 202 27 is be VBZ blog-dshr-org-8024 202 28 that that IN blog-dshr-org-8024 202 29 in in IN blog-dshr-org-8024 202 30 general general JJ blog-dshr-org-8024 202 31 , , , blog-dshr-org-8024 202 32 building build VBG blog-dshr-org-8024 202 33 the the DT blog-dshr-org-8024 202 34 same same JJ blog-dshr-org-8024 202 35 source source NN blog-dshr-org-8024 202 36 twice twice RB blog-dshr-org-8024 202 37 results result NNS blog-dshr-org-8024 202 38 in in IN blog-dshr-org-8024 202 39 different different JJ blog-dshr-org-8024 202 40 binaries binary NNS blog-dshr-org-8024 202 41 . . . blog-dshr-org-8024 203 1 Compiler compiler NN blog-dshr-org-8024 203 2 and and CC blog-dshr-org-8024 203 3 linker linker NN blog-dshr-org-8024 203 4 output output NN blog-dshr-org-8024 203 5 typically typically RB blog-dshr-org-8024 203 6 contains contain VBZ blog-dshr-org-8024 203 7 timestamps timestamp NNS blog-dshr-org-8024 203 8 , , , blog-dshr-org-8024 203 9 temporary temporary JJ blog-dshr-org-8024 203 10 file file NN blog-dshr-org-8024 203 11 names name NNS blog-dshr-org-8024 203 12 , , , blog-dshr-org-8024 203 13 and and CC blog-dshr-org-8024 203 14 other other JJ blog-dshr-org-8024 203 15 sources source NNS blog-dshr-org-8024 203 16 of of IN blog-dshr-org-8024 203 17 randomness randomness NN blog-dshr-org-8024 203 18 . . . blog-dshr-org-8024 204 1 The the DT blog-dshr-org-8024 204 2 build build NN blog-dshr-org-8024 204 3 system system NN blog-dshr-org-8024 204 4 needs need VBZ blog-dshr-org-8024 204 5 to to TO blog-dshr-org-8024 204 6 be be VB blog-dshr-org-8024 204 7 reproducible reproducible JJ blog-dshr-org-8024 204 8 . . . blog-dshr-org-8024 205 1 The the DT blog-dshr-org-8024 205 2 second second JJ blog-dshr-org-8024 205 3 technical technical JJ blog-dshr-org-8024 205 4 reason reason NN blog-dshr-org-8024 205 5 is be VBZ blog-dshr-org-8024 205 6 that that IN blog-dshr-org-8024 205 7 , , , blog-dshr-org-8024 205 8 in in IN blog-dshr-org-8024 205 9 order order NN blog-dshr-org-8024 205 10 to to TO blog-dshr-org-8024 205 11 be be VB blog-dshr-org-8024 205 12 reproducible reproducible JJ blog-dshr-org-8024 205 13 , , , blog-dshr-org-8024 205 14 the the DT blog-dshr-org-8024 205 15 multiple multiple JJ blog-dshr-org-8024 205 16 independent independent JJ blog-dshr-org-8024 205 17 builds build NNS blog-dshr-org-8024 205 18 have have VBP blog-dshr-org-8024 205 19 to to TO blog-dshr-org-8024 205 20 use use VB blog-dshr-org-8024 205 21 the the DT blog-dshr-org-8024 205 22 same same JJ blog-dshr-org-8024 205 23 build build NN blog-dshr-org-8024 205 24 environment environment NN blog-dshr-org-8024 205 25 . . . blog-dshr-org-8024 206 1 So so RB blog-dshr-org-8024 206 2 each each DT blog-dshr-org-8024 206 3 of of IN blog-dshr-org-8024 206 4 the the DT blog-dshr-org-8024 206 5 independent independent JJ blog-dshr-org-8024 206 6 build build NN blog-dshr-org-8024 206 7 environments environment NNS blog-dshr-org-8024 206 8 will will MD blog-dshr-org-8024 206 9 have have VB blog-dshr-org-8024 206 10 the the DT blog-dshr-org-8024 206 11 same same JJ blog-dshr-org-8024 206 12 vulnerabilities vulnerability NNS blog-dshr-org-8024 206 13 , , , blog-dshr-org-8024 206 14 allowing allow VBG blog-dshr-org-8024 206 15 for for IN blog-dshr-org-8024 206 16 the the DT blog-dshr-org-8024 206 17 possibility possibility NN blog-dshr-org-8024 206 18 that that IN blog-dshr-org-8024 206 19 the the DT blog-dshr-org-8024 206 20 attacker attacker NN blog-dshr-org-8024 206 21 could could MD blog-dshr-org-8024 206 22 compromise compromise VB blog-dshr-org-8024 206 23 them -PRON- PRP blog-dshr-org-8024 206 24 all all DT blog-dshr-org-8024 206 25 . . . blog-dshr-org-8024 207 1 The the DT blog-dshr-org-8024 207 2 organizational organizational JJ blog-dshr-org-8024 207 3 reason reason NN blog-dshr-org-8024 207 4 is be VBZ blog-dshr-org-8024 207 5 that that IN blog-dshr-org-8024 207 6 truly truly RB blog-dshr-org-8024 207 7 independent independent JJ blog-dshr-org-8024 207 8 builds build NNS blog-dshr-org-8024 207 9 can can MD blog-dshr-org-8024 207 10 only only RB blog-dshr-org-8024 207 11 be be VB blog-dshr-org-8024 207 12 done do VBN blog-dshr-org-8024 207 13 in in IN blog-dshr-org-8024 207 14 an an DT blog-dshr-org-8024 207 15 open open JJ blog-dshr-org-8024 207 16 source source NN blog-dshr-org-8024 207 17 environment environment NN blog-dshr-org-8024 207 18 in in IN blog-dshr-org-8024 207 19 which which WDT blog-dshr-org-8024 207 20 anyone anyone NN blog-dshr-org-8024 207 21 , , , blog-dshr-org-8024 207 22 and and CC blog-dshr-org-8024 207 23 in in IN blog-dshr-org-8024 207 24 particular particular JJ blog-dshr-org-8024 207 25 each each DT blog-dshr-org-8024 207 26 of of IN blog-dshr-org-8024 207 27 the the DT blog-dshr-org-8024 207 28 independent independent JJ blog-dshr-org-8024 207 29 builders builder NNS blog-dshr-org-8024 207 30 , , , blog-dshr-org-8024 207 31 can can MD blog-dshr-org-8024 207 32 access access VB blog-dshr-org-8024 207 33 the the DT blog-dshr-org-8024 207 34 source source NN blog-dshr-org-8024 207 35 code code NN blog-dshr-org-8024 207 36 . . . blog-dshr-org-8024 208 1 To to TO blog-dshr-org-8024 208 2 enable enable VB blog-dshr-org-8024 208 3 binaries binary NNS blog-dshr-org-8024 208 4 to to TO blog-dshr-org-8024 208 5 be be VB blog-dshr-org-8024 208 6 securely securely RB blog-dshr-org-8024 208 7 connected connect VBN blog-dshr-org-8024 208 8 to to IN blog-dshr-org-8024 208 9 their -PRON- PRP$ blog-dshr-org-8024 208 10 source source NN blog-dshr-org-8024 208 11 , , , blog-dshr-org-8024 208 12 a a DT blog-dshr-org-8024 208 13 Reproducible Reproducible NNP blog-dshr-org-8024 208 14 Builds Builds NNP blog-dshr-org-8024 208 15 effort effort NN blog-dshr-org-8024 208 16 has have VBZ blog-dshr-org-8024 208 17 been be VBN blog-dshr-org-8024 208 18 under under IN blog-dshr-org-8024 208 19 way way NN blog-dshr-org-8024 208 20 for for IN blog-dshr-org-8024 208 21 more more JJR blog-dshr-org-8024 208 22 than than IN blog-dshr-org-8024 208 23 7 7 CD blog-dshr-org-8024 208 24 years year NNS blog-dshr-org-8024 208 25 . . . blog-dshr-org-8024 209 1 Debian debian JJ blog-dshr-org-8024 209 2 project project NN blog-dshr-org-8024 209 3 lead lead VBP blog-dshr-org-8024 209 4 Chris Chris NNP blog-dshr-org-8024 209 5 Lamb Lamb NNP blog-dshr-org-8024 209 6 's 's POS blog-dshr-org-8024 209 7 45-minute 45-minute CD blog-dshr-org-8024 209 8 talk talk NN blog-dshr-org-8024 209 9 Think think VBP blog-dshr-org-8024 209 10 you -PRON- PRP blog-dshr-org-8024 209 11 're be VBP blog-dshr-org-8024 209 12 not not RB blog-dshr-org-8024 209 13 a a DT blog-dshr-org-8024 209 14 target target NN blog-dshr-org-8024 209 15 ? ? . blog-dshr-org-8024 210 1 A a DT blog-dshr-org-8024 210 2 tale tale NN blog-dshr-org-8024 210 3 of of IN blog-dshr-org-8024 210 4 3 3 CD blog-dshr-org-8024 210 5 developers developer NNS blog-dshr-org-8024 210 6 ... ... NFP blog-dshr-org-8024 210 7 provides provide VBZ blog-dshr-org-8024 210 8 an an DT blog-dshr-org-8024 210 9 overview overview NN blog-dshr-org-8024 210 10 of of IN blog-dshr-org-8024 210 11 the the DT blog-dshr-org-8024 210 12 problem problem NN blog-dshr-org-8024 210 13 and and CC blog-dshr-org-8024 210 14 the the DT blog-dshr-org-8024 210 15 work work NN blog-dshr-org-8024 210 16 to to TO blog-dshr-org-8024 210 17 solve solve VB blog-dshr-org-8024 210 18 it -PRON- PRP blog-dshr-org-8024 210 19 using use VBG blog-dshr-org-8024 210 20 three three CD blog-dshr-org-8024 210 21 example example NN blog-dshr-org-8024 210 22 compromises compromise NNS blog-dshr-org-8024 210 23 : : : blog-dshr-org-8024 210 24 Alice Alice NNP blog-dshr-org-8024 210 25 , , , blog-dshr-org-8024 210 26 a a DT blog-dshr-org-8024 210 27 package package NN blog-dshr-org-8024 210 28 developer developer NN blog-dshr-org-8024 210 29 who who WP blog-dshr-org-8024 210 30 is be VBZ blog-dshr-org-8024 210 31 blackmailed blackmail VBN blog-dshr-org-8024 210 32 to to TO blog-dshr-org-8024 210 33 distribute distribute VB blog-dshr-org-8024 210 34 binaries binary NNS blog-dshr-org-8024 210 35 that that WDT blog-dshr-org-8024 210 36 do do VBP blog-dshr-org-8024 210 37 n't not RB blog-dshr-org-8024 210 38 match match VB blog-dshr-org-8024 210 39 the the DT blog-dshr-org-8024 210 40 public public JJ blog-dshr-org-8024 210 41 source source NN blog-dshr-org-8024 210 42 ( ( -LRB- blog-dshr-org-8024 210 43 a a DT blog-dshr-org-8024 210 44 Type Type NNP blog-dshr-org-8024 210 45 A A NNP blog-dshr-org-8024 210 46 attack attack NN blog-dshr-org-8024 210 47 ) ) -RRB- blog-dshr-org-8024 210 48 . . . blog-dshr-org-8024 211 1 Bob Bob NNP blog-dshr-org-8024 211 2 , , , blog-dshr-org-8024 211 3 a a DT blog-dshr-org-8024 211 4 build build NN blog-dshr-org-8024 211 5 farm farm NN blog-dshr-org-8024 211 6 sysadmin sysadmin NN blog-dshr-org-8024 211 7 whose whose WP$ blog-dshr-org-8024 211 8 personal personal JJ blog-dshr-org-8024 211 9 computer computer NN blog-dshr-org-8024 211 10 has have VBZ blog-dshr-org-8024 211 11 been be VBN blog-dshr-org-8024 211 12 compromised compromise VBN blog-dshr-org-8024 211 13 , , , blog-dshr-org-8024 211 14 leading lead VBG blog-dshr-org-8024 211 15 to to IN blog-dshr-org-8024 211 16 a a DT blog-dshr-org-8024 211 17 compromised compromised JJ blog-dshr-org-8024 211 18 build build NN blog-dshr-org-8024 211 19 toolchain toolchain NN blog-dshr-org-8024 211 20 in in IN blog-dshr-org-8024 211 21 the the DT blog-dshr-org-8024 211 22 build build JJ blog-dshr-org-8024 211 23 farm farm NN blog-dshr-org-8024 211 24 that that WDT blog-dshr-org-8024 211 25 inserts insert VBZ blog-dshr-org-8024 211 26 backdoors backdoor NNS blog-dshr-org-8024 211 27 into into IN blog-dshr-org-8024 211 28 the the DT blog-dshr-org-8024 211 29 binaries binary NNS blog-dshr-org-8024 211 30 ( ( -LRB- blog-dshr-org-8024 211 31 a a DT blog-dshr-org-8024 211 32 Type Type NNP blog-dshr-org-8024 211 33 B B NNP blog-dshr-org-8024 211 34     _SP blog-dshr-org-8024 211 35 attack attack NN blog-dshr-org-8024 211 36 ) ) -RRB- blog-dshr-org-8024 211 37 . . . blog-dshr-org-8024 212 1 Carol Carol NNP blog-dshr-org-8024 212 2 , , , blog-dshr-org-8024 212 3 a a DT blog-dshr-org-8024 212 4 free free JJ blog-dshr-org-8024 212 5 software software NN blog-dshr-org-8024 212 6 enthusiast enthusiast NN blog-dshr-org-8024 212 7 who who WP blog-dshr-org-8024 212 8 distributes distribute VBZ blog-dshr-org-8024 212 9 binaries binary NNS blog-dshr-org-8024 212 10 to to IN blog-dshr-org-8024 212 11 friends friend NNS blog-dshr-org-8024 212 12 . . . blog-dshr-org-8024 213 1 An an DT blog-dshr-org-8024 213 2 evil evil JJ blog-dshr-org-8024 213 3 maid maid NN blog-dshr-org-8024 213 4 attack attack NN blog-dshr-org-8024 213 5 has have VBZ blog-dshr-org-8024 213 6 compromised compromise VBN blog-dshr-org-8024 213 7 her -PRON- PRP$ blog-dshr-org-8024 213 8 laptop laptop NN blog-dshr-org-8024 213 9 . . . blog-dshr-org-8024 214 1 As as IN blog-dshr-org-8024 214 2 Lamb Lamb NNP blog-dshr-org-8024 214 3 describes describe VBZ blog-dshr-org-8024 214 4 , , , blog-dshr-org-8024 214 5 eliminating eliminate VBG blog-dshr-org-8024 214 6 all all DT blog-dshr-org-8024 214 7 sources source NNS blog-dshr-org-8024 214 8 of of IN blog-dshr-org-8024 214 9 irreproducibility irreproducibility NN blog-dshr-org-8024 214 10 from from IN blog-dshr-org-8024 214 11 a a DT blog-dshr-org-8024 214 12 package package NN blog-dshr-org-8024 214 13 is be VBZ blog-dshr-org-8024 214 14 a a DT blog-dshr-org-8024 214 15 painstaking painstaking JJ blog-dshr-org-8024 214 16 process process NN blog-dshr-org-8024 214 17 because because IN blog-dshr-org-8024 214 18 there there EX blog-dshr-org-8024 214 19 are be VBP blog-dshr-org-8024 214 20 so so RB blog-dshr-org-8024 214 21 many many JJ blog-dshr-org-8024 214 22 possibilities possibility NNS blog-dshr-org-8024 214 23 . . . blog-dshr-org-8024 215 1 They -PRON- PRP blog-dshr-org-8024 215 2 include include VBP blog-dshr-org-8024 215 3 non non JJ blog-dshr-org-8024 215 4 - - JJ blog-dshr-org-8024 215 5 deterministic deterministic JJ blog-dshr-org-8024 215 6 behaviors behavior NNS blog-dshr-org-8024 215 7 such such JJ blog-dshr-org-8024 215 8 as as IN blog-dshr-org-8024 215 9 iterating iterate VBG blog-dshr-org-8024 215 10 over over RP blog-dshr-org-8024 215 11 hashmaps hashmaps RB blog-dshr-org-8024 215 12 , , , blog-dshr-org-8024 215 13 parallel parallel JJ blog-dshr-org-8024 215 14 builds build NNS blog-dshr-org-8024 215 15 , , , blog-dshr-org-8024 215 16 timestamps timestamp NNS blog-dshr-org-8024 215 17 , , , blog-dshr-org-8024 215 18 build build VB blog-dshr-org-8024 215 19 paths path NNS blog-dshr-org-8024 215 20 , , , blog-dshr-org-8024 215 21 file file NN blog-dshr-org-8024 215 22 system system NN blog-dshr-org-8024 215 23 directory directory NN blog-dshr-org-8024 215 24 name name NN blog-dshr-org-8024 215 25 order order NN blog-dshr-org-8024 215 26 , , , blog-dshr-org-8024 215 27 and and CC blog-dshr-org-8024 215 28 so so RB blog-dshr-org-8024 215 29 on on RB blog-dshr-org-8024 215 30 . . . blog-dshr-org-8024 216 1 The the DT blog-dshr-org-8024 216 2 work work NN blog-dshr-org-8024 216 3 started start VBD blog-dshr-org-8024 216 4 in in IN blog-dshr-org-8024 216 5 2013 2013 CD blog-dshr-org-8024 216 6 with with IN blog-dshr-org-8024 216 7 24 24 CD blog-dshr-org-8024 216 8 % % NN blog-dshr-org-8024 216 9 of of IN blog-dshr-org-8024 216 10 Debian debian JJ blog-dshr-org-8024 216 11 packages package NNS blog-dshr-org-8024 216 12 building build VBG blog-dshr-org-8024 216 13 reproducibly reproducibly RB blog-dshr-org-8024 216 14 . . . blog-dshr-org-8024 217 1 Currently currently RB blog-dshr-org-8024 217 2 , , , blog-dshr-org-8024 217 3 around around RB blog-dshr-org-8024 217 4 95 95 CD blog-dshr-org-8024 217 5 % % NN blog-dshr-org-8024 217 6 of of IN blog-dshr-org-8024 217 7 the the DT blog-dshr-org-8024 217 8 Debian debian JJ blog-dshr-org-8024 217 9 packages package NNS blog-dshr-org-8024 217 10 for for IN blog-dshr-org-8024 217 11 the the DT blog-dshr-org-8024 217 12 amd64 amd64 ADD blog-dshr-org-8024 217 13 and and CC blog-dshr-org-8024 217 14 arm64 arm64 NNP blog-dshr-org-8024 217 15 architectures architecture NNS blog-dshr-org-8024 217 16 are be VBP blog-dshr-org-8024 217 17 now now RB blog-dshr-org-8024 217 18 reproducible reproducible JJ blog-dshr-org-8024 217 19 . . . blog-dshr-org-8024 218 1 That that DT blog-dshr-org-8024 218 2 is be VBZ blog-dshr-org-8024 218 3 good good JJ blog-dshr-org-8024 218 4 , , , blog-dshr-org-8024 218 5 but but CC blog-dshr-org-8024 218 6 100 100 CD blog-dshr-org-8024 218 7 % % NN blog-dshr-org-8024 218 8 coverage coverage NN blog-dshr-org-8024 218 9 is be VBZ blog-dshr-org-8024 218 10 really really RB blog-dshr-org-8024 218 11 necessary necessary JJ blog-dshr-org-8024 218 12 to to TO blog-dshr-org-8024 218 13 provide provide VB blog-dshr-org-8024 218 14 security security NN blog-dshr-org-8024 218 15 . . . blog-dshr-org-8024 219 1 [ [ -LRB- blog-dshr-org-8024 219 2 Slide slide NN blog-dshr-org-8024 219 3 14 14 CD blog-dshr-org-8024 219 4 ] ] -RRB- blog-dshr-org-8024 219 5 Way way NN blog-dshr-org-8024 219 6 back back RB blog-dshr-org-8024 219 7 in in IN blog-dshr-org-8024 219 8 1974 1974 CD blog-dshr-org-8024 219 9 , , , blog-dshr-org-8024 219 10 Paul Paul NNP blog-dshr-org-8024 219 11 Karger Karger NNP blog-dshr-org-8024 219 12 and and CC blog-dshr-org-8024 219 13 Roger Roger NNP blog-dshr-org-8024 219 14 Schell Schell NNP blog-dshr-org-8024 219 15 discovered discover VBD blog-dshr-org-8024 219 16 a a DT blog-dshr-org-8024 219 17 devastating devastating JJ blog-dshr-org-8024 219 18 attack attack NN blog-dshr-org-8024 219 19 against against IN blog-dshr-org-8024 219 20 computer computer NN blog-dshr-org-8024 219 21 systems system NNS blog-dshr-org-8024 219 22 . . . blog-dshr-org-8024 220 1 Ken Ken NNP blog-dshr-org-8024 220 2 Thompson Thompson NNP blog-dshr-org-8024 220 3 described describe VBD blog-dshr-org-8024 220 4 it -PRON- PRP blog-dshr-org-8024 220 5 in in IN blog-dshr-org-8024 220 6 his -PRON- PRP$ blog-dshr-org-8024 220 7 classic classic JJ blog-dshr-org-8024 220 8 1984 1984 CD blog-dshr-org-8024 220 9 speech speech NN blog-dshr-org-8024 220 10 , , , blog-dshr-org-8024 220 11 " " `` blog-dshr-org-8024 220 12 Reflections reflection NNS blog-dshr-org-8024 220 13 on on IN blog-dshr-org-8024 220 14 Trusting Trusting NNP blog-dshr-org-8024 220 15 Trust Trust NNP blog-dshr-org-8024 220 16 . . . blog-dshr-org-8024 220 17 " " '' blog-dshr-org-8024 221 1 Basically basically RB blog-dshr-org-8024 221 2 , , , blog-dshr-org-8024 221 3 an an DT blog-dshr-org-8024 221 4 attacker attacker NN blog-dshr-org-8024 221 5 changes change VBZ blog-dshr-org-8024 221 6 a a DT blog-dshr-org-8024 221 7 compiler compiler NN blog-dshr-org-8024 221 8 binary binary JJ blog-dshr-org-8024 221 9 to to TO blog-dshr-org-8024 221 10 produce produce VB blog-dshr-org-8024 221 11 malicious malicious JJ blog-dshr-org-8024 221 12 versions version NNS blog-dshr-org-8024 221 13 of of IN blog-dshr-org-8024 221 14 some some DT blog-dshr-org-8024 221 15 programs program NNS blog-dshr-org-8024 221 16 , , , blog-dshr-org-8024 221 17 INCLUDING including RB blog-dshr-org-8024 221 18 ITSELF ITSELF NNP blog-dshr-org-8024 221 19 . . . blog-dshr-org-8024 222 1 Once once IN blog-dshr-org-8024 222 2 this this DT blog-dshr-org-8024 222 3 is be VBZ blog-dshr-org-8024 222 4 done do VBN blog-dshr-org-8024 222 5 , , , blog-dshr-org-8024 222 6 the the DT blog-dshr-org-8024 222 7 attack attack NN blog-dshr-org-8024 222 8 perpetuates perpetuate NNS blog-dshr-org-8024 222 9 , , , blog-dshr-org-8024 222 10 essentially essentially RB blog-dshr-org-8024 222 11 undetectably undetectably RB blog-dshr-org-8024 222 12 . . . blog-dshr-org-8024 223 1 Thompson Thompson NNP blog-dshr-org-8024 223 2 demonstrated demonstrate VBD blog-dshr-org-8024 223 3 the the DT blog-dshr-org-8024 223 4 attack attack NN blog-dshr-org-8024 223 5 in in IN blog-dshr-org-8024 223 6 a a DT blog-dshr-org-8024 223 7 devastating devastating JJ blog-dshr-org-8024 223 8 way way NN blog-dshr-org-8024 223 9 : : : blog-dshr-org-8024 223 10 he -PRON- PRP blog-dshr-org-8024 223 11 subverted subvert VBD blog-dshr-org-8024 223 12 a a DT blog-dshr-org-8024 223 13 compiler compiler NN blog-dshr-org-8024 223 14 of of IN blog-dshr-org-8024 223 15 an an DT blog-dshr-org-8024 223 16 experimental experimental JJ blog-dshr-org-8024 223 17 victim victim NN blog-dshr-org-8024 223 18 , , , blog-dshr-org-8024 223 19 allowing allow VBG blog-dshr-org-8024 223 20 Thompson Thompson NNP blog-dshr-org-8024 223 21 to to TO blog-dshr-org-8024 223 22 log log VB blog-dshr-org-8024 223 23 in in RP blog-dshr-org-8024 223 24 as as IN blog-dshr-org-8024 223 25 root root NN blog-dshr-org-8024 223 26 without without IN blog-dshr-org-8024 223 27 using use VBG blog-dshr-org-8024 223 28 a a DT blog-dshr-org-8024 223 29 password password NN blog-dshr-org-8024 223 30 . . . blog-dshr-org-8024 224 1 The the DT blog-dshr-org-8024 224 2 victim victim NN blog-dshr-org-8024 224 3 never never RB blog-dshr-org-8024 224 4 noticed notice VBD blog-dshr-org-8024 224 5 the the DT blog-dshr-org-8024 224 6 attack attack NN blog-dshr-org-8024 224 7 , , , blog-dshr-org-8024 224 8 even even RB blog-dshr-org-8024 224 9 when when WRB blog-dshr-org-8024 224 10 they -PRON- PRP blog-dshr-org-8024 224 11 disassembled disassemble VBD blog-dshr-org-8024 224 12 the the DT blog-dshr-org-8024 224 13 binaries binary NNS blog-dshr-org-8024 224 14 -- -- : blog-dshr-org-8024 224 15 the the DT blog-dshr-org-8024 224 16 compiler compiler NN blog-dshr-org-8024 224 17 rigged rig VBD blog-dshr-org-8024 224 18 the the DT blog-dshr-org-8024 224 19 disassembler disassembler NN blog-dshr-org-8024 224 20 , , , blog-dshr-org-8024 224 21 too too RB blog-dshr-org-8024 224 22 . . . blog-dshr-org-8024 225 1 In in IN blog-dshr-org-8024 225 2 2006 2006 CD blog-dshr-org-8024 225 3 , , , blog-dshr-org-8024 225 4 Bruce Bruce NNP blog-dshr-org-8024 225 5 Schneier Schneier NNP blog-dshr-org-8024 225 6 summarized summarize VBD blog-dshr-org-8024 225 7 the the DT blog-dshr-org-8024 225 8 message message NN blog-dshr-org-8024 225 9 of of IN blog-dshr-org-8024 225 10 perhaps perhaps RB blog-dshr-org-8024 225 11 the the DT blog-dshr-org-8024 225 12 most most RBS blog-dshr-org-8024 225 13 famous famous JJ blog-dshr-org-8024 225 14 of of IN blog-dshr-org-8024 225 15 ACM ACM NNP blog-dshr-org-8024 225 16 's 's POS blog-dshr-org-8024 225 17 annual annual JJ blog-dshr-org-8024 225 18 Turing Turing NNP blog-dshr-org-8024 225 19 Award Award NNP blog-dshr-org-8024 225 20 lectures lecture NNS blog-dshr-org-8024 225 21 . . . blog-dshr-org-8024 226 1 In in IN blog-dshr-org-8024 226 2 this this DT blog-dshr-org-8024 226 3 attack attack NN blog-dshr-org-8024 226 4 , , , blog-dshr-org-8024 226 5 the the DT blog-dshr-org-8024 226 6 compromised compromise VBN blog-dshr-org-8024 226 7 build build NN blog-dshr-org-8024 226 8 environment environment NN blog-dshr-org-8024 226 9 inserts insert NNS blog-dshr-org-8024 226 10 malware malware NNP blog-dshr-org-8024 226 11 even even RB blog-dshr-org-8024 226 12 though though IN blog-dshr-org-8024 226 13 it -PRON- PRP blog-dshr-org-8024 226 14 is be VBZ blog-dshr-org-8024 226 15 building build VBG blog-dshr-org-8024 226 16 the the DT blog-dshr-org-8024 226 17 unmodified unmodified JJ blog-dshr-org-8024 226 18 source source NN blog-dshr-org-8024 226 19 code code NN blog-dshr-org-8024 226 20 . . . blog-dshr-org-8024 227 1 Unlike unlike IN blog-dshr-org-8024 227 2 the the DT blog-dshr-org-8024 227 3 SolarWinds SolarWinds NNP blog-dshr-org-8024 227 4 attack attack NN blog-dshr-org-8024 227 5 , , , blog-dshr-org-8024 227 6 the the DT blog-dshr-org-8024 227 7 signatures signature NNS blog-dshr-org-8024 227 8 testifying testify VBG blog-dshr-org-8024 227 9 that that IN blog-dshr-org-8024 227 10 the the DT blog-dshr-org-8024 227 11 binaries binary NNS blog-dshr-org-8024 227 12 are be VBP blog-dshr-org-8024 227 13 the the DT blog-dshr-org-8024 227 14 output output NN blog-dshr-org-8024 227 15 of of IN blog-dshr-org-8024 227 16 building build VBG blog-dshr-org-8024 227 17 the the DT blog-dshr-org-8024 227 18 signed sign VBN blog-dshr-org-8024 227 19 source source NN blog-dshr-org-8024 227 20 code code NN blog-dshr-org-8024 227 21 are be VBP blog-dshr-org-8024 227 22 correct correct JJ blog-dshr-org-8024 227 23 . . . blog-dshr-org-8024 228 1 [ [ -LRB- blog-dshr-org-8024 228 2 Slide slide NN blog-dshr-org-8024 228 3 15 15 CD blog-dshr-org-8024 228 4 ] ] -RRB- blog-dshr-org-8024 228 5 Source source NN blog-dshr-org-8024 228 6 This this DT blog-dshr-org-8024 228 7 is be VBZ blog-dshr-org-8024 228 8 the the DT blog-dshr-org-8024 228 9 motivation motivation NN blog-dshr-org-8024 228 10 for for IN blog-dshr-org-8024 228 11 the the DT blog-dshr-org-8024 228 12 Bootstrappable Bootstrappable NNP blog-dshr-org-8024 228 13 Builds Builds NNPS blog-dshr-org-8024 228 14 project project NN blog-dshr-org-8024 228 15 , , , blog-dshr-org-8024 228 16 whose whose WP$ blog-dshr-org-8024 228 17 goal goal NN blog-dshr-org-8024 228 18 is be VBZ blog-dshr-org-8024 228 19 to to TO blog-dshr-org-8024 228 20 create create VB blog-dshr-org-8024 228 21 a a DT blog-dshr-org-8024 228 22 process process NN blog-dshr-org-8024 228 23 for for IN blog-dshr-org-8024 228 24 building build VBG blog-dshr-org-8024 228 25 a a DT blog-dshr-org-8024 228 26 complete complete JJ blog-dshr-org-8024 228 27 toolchain toolchain NN blog-dshr-org-8024 228 28 starting start VBG blog-dshr-org-8024 228 29 from from IN blog-dshr-org-8024 228 30 a a DT blog-dshr-org-8024 228 31 " " `` blog-dshr-org-8024 228 32 seed seed NN blog-dshr-org-8024 228 33 " " '' blog-dshr-org-8024 228 34 binary binary NN blog-dshr-org-8024 228 35 that that WDT blog-dshr-org-8024 228 36 is be VBZ blog-dshr-org-8024 228 37 simple simple JJ blog-dshr-org-8024 228 38 enough enough RB blog-dshr-org-8024 228 39 to to TO blog-dshr-org-8024 228 40 be be VB blog-dshr-org-8024 228 41 certified certify VBN blog-dshr-org-8024 228 42 " " '' blog-dshr-org-8024 228 43 by by IN blog-dshr-org-8024 228 44 inspection inspection NN blog-dshr-org-8024 228 45 " " '' blog-dshr-org-8024 228 46 . . . blog-dshr-org-8024 229 1 Recently recently RB blog-dshr-org-8024 229 2 , , , blog-dshr-org-8024 229 3 they -PRON- PRP blog-dshr-org-8024 229 4 achieved achieve VBD blog-dshr-org-8024 229 5 a a DT blog-dshr-org-8024 229 6 major major JJ blog-dshr-org-8024 229 7 milestone milestone NN blog-dshr-org-8024 229 8 . . . blog-dshr-org-8024 230 1 Starting start VBG blog-dshr-org-8024 230 2 from from IN blog-dshr-org-8024 230 3 a a DT blog-dshr-org-8024 230 4 tiny tiny JJ blog-dshr-org-8024 230 5 " " `` blog-dshr-org-8024 230 6 seed seed NN blog-dshr-org-8024 230 7 " " '' blog-dshr-org-8024 230 8 binary binary NN blog-dshr-org-8024 230 9 , , , blog-dshr-org-8024 230 10 they -PRON- PRP blog-dshr-org-8024 230 11 were be VBD blog-dshr-org-8024 230 12 able able JJ blog-dshr-org-8024 230 13 to to TO blog-dshr-org-8024 230 14 create create VB blog-dshr-org-8024 230 15 a a DT blog-dshr-org-8024 230 16 working work VBG blog-dshr-org-8024 230 17 TinyCC tinycc JJ blog-dshr-org-8024 230 18 compiler compiler NN blog-dshr-org-8024 230 19 for for IN blog-dshr-org-8024 230 20 the the DT blog-dshr-org-8024 230 21 ARM ARM NNP blog-dshr-org-8024 230 22 architecture architecture NN blog-dshr-org-8024 230 23 . . . blog-dshr-org-8024 231 1 Starting start VBG blog-dshr-org-8024 231 2 from from IN blog-dshr-org-8024 231 3 TinyCC TinyCC NNP blog-dshr-org-8024 231 4 , , , blog-dshr-org-8024 231 5 it -PRON- PRP blog-dshr-org-8024 231 6 is be VBZ blog-dshr-org-8024 231 7 possible possible JJ blog-dshr-org-8024 231 8 to to TO blog-dshr-org-8024 231 9 build build VB blog-dshr-org-8024 231 10 the the DT blog-dshr-org-8024 231 11 entire entire JJ blog-dshr-org-8024 231 12 GnuCC GnuCC NNP blog-dshr-org-8024 231 13 toolchain toolchain NN blog-dshr-org-8024 231 14 and and CC blog-dshr-org-8024 231 15 thus thus RB blog-dshr-org-8024 231 16 , , , blog-dshr-org-8024 231 17 in in IN blog-dshr-org-8024 231 18 principle principle NN blog-dshr-org-8024 231 19 , , , blog-dshr-org-8024 231 20 a a DT blog-dshr-org-8024 231 21 working work VBG blog-dshr-org-8024 231 22 Linux Linux NNP blog-dshr-org-8024 231 23 . . . blog-dshr-org-8024 232 1 There there EX blog-dshr-org-8024 232 2 is be VBZ blog-dshr-org-8024 232 3 clearly clearly RB blog-dshr-org-8024 232 4 a a DT blog-dshr-org-8024 232 5 long long JJ blog-dshr-org-8024 232 6 way way NN blog-dshr-org-8024 232 7 still still RB blog-dshr-org-8024 232 8 to to TO blog-dshr-org-8024 232 9 go go VB blog-dshr-org-8024 232 10 to to IN blog-dshr-org-8024 232 11 a a DT blog-dshr-org-8024 232 12 bootstrapped bootstrappe VBN blog-dshr-org-8024 232 13 full full JJ blog-dshr-org-8024 232 14 toolchain toolchain NN blog-dshr-org-8024 232 15 proof proof NN blog-dshr-org-8024 232 16 against against IN blog-dshr-org-8024 232 17 Type Type NNP blog-dshr-org-8024 232 18 B B NNP blog-dshr-org-8024 232 19 attacks attack NNS blog-dshr-org-8024 232 20 . . . blog-dshr-org-8024 233 1 The the DT blog-dshr-org-8024 233 2 event event NN blog-dshr-org-8024 233 3 - - HYPH blog-dshr-org-8024 233 4 stream stream NN blog-dshr-org-8024 233 5 attack attack NN blog-dshr-org-8024 233 6 can can MD blog-dshr-org-8024 233 7 be be VB blog-dshr-org-8024 233 8 thought think VBN blog-dshr-org-8024 233 9 of of IN blog-dshr-org-8024 233 10 as as IN blog-dshr-org-8024 233 11 the the DT blog-dshr-org-8024 233 12 organization organization NN blog-dshr-org-8024 233 13 - - HYPH blog-dshr-org-8024 233 14 level level NN blog-dshr-org-8024 233 15 analog analog NN blog-dshr-org-8024 233 16 of of IN blog-dshr-org-8024 233 17 a a DT blog-dshr-org-8024 233 18 Sybil Sybil NNP blog-dshr-org-8024 233 19 attack attack NN blog-dshr-org-8024 233 20 on on IN blog-dshr-org-8024 233 21 a a DT blog-dshr-org-8024 233 22 peer peer NN blog-dshr-org-8024 233 23 - - HYPH blog-dshr-org-8024 233 24 to to IN blog-dshr-org-8024 233 25 - - HYPH blog-dshr-org-8024 233 26 peer peer NN blog-dshr-org-8024 233 27 system system NN blog-dshr-org-8024 233 28 . . . blog-dshr-org-8024 234 1 Creating create VBG blog-dshr-org-8024 234 2 an an DT blog-dshr-org-8024 234 3 e e NN blog-dshr-org-8024 234 4 - - NN blog-dshr-org-8024 234 5 mail mail NN blog-dshr-org-8024 234 6 identity identity NN blog-dshr-org-8024 234 7 is be VBZ blog-dshr-org-8024 234 8 almost almost RB blog-dshr-org-8024 234 9 free free JJ blog-dshr-org-8024 234 10 . . . blog-dshr-org-8024 235 1 The the DT blog-dshr-org-8024 235 2 defense defense NN blog-dshr-org-8024 235 3 against against IN blog-dshr-org-8024 235 4 Sybil Sybil NNP blog-dshr-org-8024 235 5 attacks attack NNS blog-dshr-org-8024 235 6 is be VBZ blog-dshr-org-8024 235 7 to to TO blog-dshr-org-8024 235 8 make make VB blog-dshr-org-8024 235 9 maintaining maintain VBG blog-dshr-org-8024 235 10 and and CC blog-dshr-org-8024 235 11 using use VBG blog-dshr-org-8024 235 12 an an DT blog-dshr-org-8024 235 13 identity identity NN blog-dshr-org-8024 235 14 in in IN blog-dshr-org-8024 235 15 the the DT blog-dshr-org-8024 235 16 system system NN blog-dshr-org-8024 235 17 expensive expensive JJ blog-dshr-org-8024 235 18 . . . blog-dshr-org-8024 236 1 As as IN blog-dshr-org-8024 236 2 with with IN blog-dshr-org-8024 236 3 proof proof NN blog-dshr-org-8024 236 4 - - HYPH blog-dshr-org-8024 236 5 of of IN blog-dshr-org-8024 236 6 - - HYPH blog-dshr-org-8024 236 7 work work NN blog-dshr-org-8024 236 8 in in IN blog-dshr-org-8024 236 9 Bitcoin Bitcoin NNP blog-dshr-org-8024 236 10 , , , blog-dshr-org-8024 236 11 the the DT blog-dshr-org-8024 236 12 idea idea NN blog-dshr-org-8024 236 13 is be VBZ blog-dshr-org-8024 236 14 that that IN blog-dshr-org-8024 236 15 the the DT blog-dshr-org-8024 236 16 white white JJ blog-dshr-org-8024 236 17 hats hat NNS blog-dshr-org-8024 236 18 will will MD blog-dshr-org-8024 236 19 spend spend VB blog-dshr-org-8024 236 20 more more JJR blog-dshr-org-8024 236 21 ( ( -LRB- blog-dshr-org-8024 236 22 compute compute VB blog-dshr-org-8024 236 23 more more RBR blog-dshr-org-8024 236 24 useless useless JJ blog-dshr-org-8024 236 25 hashes hash NNS blog-dshr-org-8024 236 26 ) ) -RRB- blog-dshr-org-8024 236 27 than than IN blog-dshr-org-8024 236 28 the the DT blog-dshr-org-8024 236 29 black black JJ blog-dshr-org-8024 236 30 hats hat NNS blog-dshr-org-8024 236 31 . . . blog-dshr-org-8024 237 1 Even even RB blog-dshr-org-8024 237 2 this this DT blog-dshr-org-8024 237 3 has have VBZ blog-dshr-org-8024 237 4 limits limit NNS blog-dshr-org-8024 237 5 . . . blog-dshr-org-8024 238 1 Eric Eric NNP blog-dshr-org-8024 238 2 Budish Budish NNP blog-dshr-org-8024 238 3 's 's POS blog-dshr-org-8024 238 4 analysis analysis NN blog-dshr-org-8024 238 5 shows show VBZ blog-dshr-org-8024 238 6 that that IN blog-dshr-org-8024 238 7 , , , blog-dshr-org-8024 238 8 if if IN blog-dshr-org-8024 238 9 the the DT blog-dshr-org-8024 238 10 potential potential JJ blog-dshr-org-8024 238 11 gain gain NN blog-dshr-org-8024 238 12 from from IN blog-dshr-org-8024 238 13 an an DT blog-dshr-org-8024 238 14 attack attack NN blog-dshr-org-8024 238 15 on on IN blog-dshr-org-8024 238 16 a a DT blog-dshr-org-8024 238 17 blockchain blockchain NN blog-dshr-org-8024 238 18 is be VBZ blog-dshr-org-8024 238 19 to to TO blog-dshr-org-8024 238 20 be be VB blog-dshr-org-8024 238 21 outweighed outweigh VBN blog-dshr-org-8024 238 22 by by IN blog-dshr-org-8024 238 23 its -PRON- PRP$ blog-dshr-org-8024 238 24 cost cost NN blog-dshr-org-8024 238 25 , , , blog-dshr-org-8024 238 26 the the DT blog-dshr-org-8024 238 27 value value NN blog-dshr-org-8024 238 28 of of IN blog-dshr-org-8024 238 29 transactions transaction NNS blog-dshr-org-8024 238 30 in in IN blog-dshr-org-8024 238 31 a a DT blog-dshr-org-8024 238 32 block block NN blog-dshr-org-8024 238 33 must must MD blog-dshr-org-8024 238 34 be be VB blog-dshr-org-8024 238 35 less less JJR blog-dshr-org-8024 238 36 than than IN blog-dshr-org-8024 238 37 the the DT blog-dshr-org-8024 238 38 block block NN blog-dshr-org-8024 238 39 reward reward NN blog-dshr-org-8024 238 40 . . . blog-dshr-org-8024 239 1 Would Would MD blog-dshr-org-8024 239 2 a a DT blog-dshr-org-8024 239 3 similar similar JJ blog-dshr-org-8024 239 4 defense defense NN blog-dshr-org-8024 239 5 against against IN blog-dshr-org-8024 239 6 " " `` blog-dshr-org-8024 239 7 Sybil Sybil NNP blog-dshr-org-8024 239 8 " " '' blog-dshr-org-8024 239 9 type type NN blog-dshr-org-8024 239 10 A a DT blog-dshr-org-8024 239 11 attacks attack NNS blog-dshr-org-8024 239 12 on on IN blog-dshr-org-8024 239 13 the the DT blog-dshr-org-8024 239 14 software software NN blog-dshr-org-8024 239 15 supply supply NN blog-dshr-org-8024 239 16 chain chain NN blog-dshr-org-8024 239 17 be be VB blog-dshr-org-8024 239 18 possible possible JJ blog-dshr-org-8024 239 19 ? ? . blog-dshr-org-8024 240 1 There there EX blog-dshr-org-8024 240 2 are be VBP blog-dshr-org-8024 240 3 a a DT blog-dshr-org-8024 240 4 number number NN blog-dshr-org-8024 240 5 of of IN blog-dshr-org-8024 240 6 issues issue NNS blog-dshr-org-8024 240 7 : : : blog-dshr-org-8024 240 8 The the DT blog-dshr-org-8024 240 9 potential potential JJ blog-dshr-org-8024 240 10 gains gain NNS blog-dshr-org-8024 240 11 from from IN blog-dshr-org-8024 240 12 such such JJ blog-dshr-org-8024 240 13 attacks attack NNS blog-dshr-org-8024 240 14 are be VBP blog-dshr-org-8024 240 15 large large JJ blog-dshr-org-8024 240 16 , , , blog-dshr-org-8024 240 17 both both DT blog-dshr-org-8024 240 18 because because IN blog-dshr-org-8024 240 19 they -PRON- PRP blog-dshr-org-8024 240 20 can can MD blog-dshr-org-8024 240 21 compromise compromise VB blog-dshr-org-8024 240 22 very very RB blog-dshr-org-8024 240 23 large large JJ blog-dshr-org-8024 240 24 numbers number NNS blog-dshr-org-8024 240 25 of of IN blog-dshr-org-8024 240 26 systems system NNS blog-dshr-org-8024 240 27 quickly quickly RB blog-dshr-org-8024 240 28 ( ( -LRB- blog-dshr-org-8024 240 29 event event NN blog-dshr-org-8024 240 30 - - HYPH blog-dshr-org-8024 240 31 stream stream NN blog-dshr-org-8024 240 32 had have VBD blog-dshr-org-8024 240 33 2 2 CD blog-dshr-org-8024 240 34 M m CD blog-dshr-org-8024 240 35 downloads download NNS blog-dshr-org-8024 240 36 ) ) -RRB- blog-dshr-org-8024 240 37 , , , blog-dshr-org-8024 240 38 and and CC blog-dshr-org-8024 240 39 because because IN blog-dshr-org-8024 240 40 the the DT blog-dshr-org-8024 240 41 banking banking NN blog-dshr-org-8024 240 42 credentials credential NNS blog-dshr-org-8024 240 43 , , , blog-dshr-org-8024 240 44 cryptocurrency cryptocurrency NN blog-dshr-org-8024 240 45 wallets wallet NNS blog-dshr-org-8024 240 46 , , , blog-dshr-org-8024 240 47 and and CC blog-dshr-org-8024 240 48 other other JJ blog-dshr-org-8024 240 49 data datum NNS blog-dshr-org-8024 240 50 these these DT blog-dshr-org-8024 240 51 systems system NNS blog-dshr-org-8024 240 52 contain contain VBP blog-dshr-org-8024 240 53 can can MD blog-dshr-org-8024 240 54 quickly quickly RB blog-dshr-org-8024 240 55 be be VB blog-dshr-org-8024 240 56 converted convert VBN blog-dshr-org-8024 240 57 into into IN blog-dshr-org-8024 240 58 large large JJ blog-dshr-org-8024 240 59 amounts amount NNS blog-dshr-org-8024 240 60 of of IN blog-dshr-org-8024 240 61 cash cash NN blog-dshr-org-8024 240 62 . . . blog-dshr-org-8024 241 1 Thus thus RB blog-dshr-org-8024 241 2 the the DT blog-dshr-org-8024 241 3 penalty penalty NN blog-dshr-org-8024 241 4 for for IN blog-dshr-org-8024 241 5 mounting mount VBG blog-dshr-org-8024 241 6 an an DT blog-dshr-org-8024 241 7 attack attack NN blog-dshr-org-8024 241 8 would would MD blog-dshr-org-8024 241 9 have have VB blog-dshr-org-8024 241 10 to to TO blog-dshr-org-8024 241 11 be be VB blog-dshr-org-8024 241 12 an an DT blog-dshr-org-8024 241 13 even even RB blog-dshr-org-8024 241 14 larger large JJR blog-dshr-org-8024 241 15 amount amount NN blog-dshr-org-8024 241 16 of of IN blog-dshr-org-8024 241 17 cash cash NN blog-dshr-org-8024 241 18 . . . blog-dshr-org-8024 242 1 Package package NN blog-dshr-org-8024 242 2 maintainers maintainer NNS blog-dshr-org-8024 242 3 would would MD blog-dshr-org-8024 242 4 need need VB blog-dshr-org-8024 242 5 to to TO blog-dshr-org-8024 242 6 be be VB blog-dshr-org-8024 242 7 bonded bond VBN blog-dshr-org-8024 242 8 or or CC blog-dshr-org-8024 242 9 insured insure VBN blog-dshr-org-8024 242 10 for for IN blog-dshr-org-8024 242 11 large large JJ blog-dshr-org-8024 242 12 sums sum NNS blog-dshr-org-8024 242 13 , , , blog-dshr-org-8024 242 14 which which WDT blog-dshr-org-8024 242 15 implies imply VBZ blog-dshr-org-8024 242 16 that that IN blog-dshr-org-8024 242 17 distributions distribution NNS blog-dshr-org-8024 242 18 and and CC blog-dshr-org-8024 242 19 package package NN blog-dshr-org-8024 242 20 libraries library NNS blog-dshr-org-8024 242 21 would would MD blog-dshr-org-8024 242 22 need need VB blog-dshr-org-8024 242 23 organizational organizational JJ blog-dshr-org-8024 242 24 structures structure NNS blog-dshr-org-8024 242 25 capable capable JJ blog-dshr-org-8024 242 26 of of IN blog-dshr-org-8024 242 27 enforcing enforce VBG blog-dshr-org-8024 242 28 these these DT blog-dshr-org-8024 242 29 requirements requirement NNS blog-dshr-org-8024 242 30 . . . blog-dshr-org-8024 243 1 Bonding bonding NN blog-dshr-org-8024 243 2 and and CC blog-dshr-org-8024 243 3 insurance insurance NN blog-dshr-org-8024 243 4 would would MD blog-dshr-org-8024 243 5 be be VB blog-dshr-org-8024 243 6 expensive expensive JJ blog-dshr-org-8024 243 7 for for IN blog-dshr-org-8024 243 8 package package NN blog-dshr-org-8024 243 9 maintainers maintainer NNS blog-dshr-org-8024 243 10 , , , blog-dshr-org-8024 243 11 who who WP blog-dshr-org-8024 243 12 are be VBP blog-dshr-org-8024 243 13 mostly mostly RB blog-dshr-org-8024 243 14 unpaid unpaid JJ blog-dshr-org-8024 243 15 volunteers volunteer NNS blog-dshr-org-8024 243 16 . . . blog-dshr-org-8024 244 1 There there EX blog-dshr-org-8024 244 2 would would MD blog-dshr-org-8024 244 3 have have VB blog-dshr-org-8024 244 4 to to TO blog-dshr-org-8024 244 5 be be VB blog-dshr-org-8024 244 6 a a DT blog-dshr-org-8024 244 7 way way NN blog-dshr-org-8024 244 8 of of IN blog-dshr-org-8024 244 9 paying pay VBG blog-dshr-org-8024 244 10 them -PRON- PRP blog-dshr-org-8024 244 11 for for IN blog-dshr-org-8024 244 12 their -PRON- PRP$ blog-dshr-org-8024 244 13 efforts effort NNS blog-dshr-org-8024 244 14 , , , blog-dshr-org-8024 244 15 at at IN blog-dshr-org-8024 244 16 least least JJS blog-dshr-org-8024 244 17 enough enough RB blog-dshr-org-8024 244 18 to to TO blog-dshr-org-8024 244 19 cover cover VB blog-dshr-org-8024 244 20 the the DT blog-dshr-org-8024 244 21 costs cost NNS blog-dshr-org-8024 244 22 of of IN blog-dshr-org-8024 244 23 bonding bonding NN blog-dshr-org-8024 244 24 and and CC blog-dshr-org-8024 244 25 insurance insurance NN blog-dshr-org-8024 244 26 . . . blog-dshr-org-8024 245 1 Thus thus RB blog-dshr-org-8024 245 2 users user NNS blog-dshr-org-8024 245 3 of of IN blog-dshr-org-8024 245 4 the the DT blog-dshr-org-8024 245 5 packages package NNS blog-dshr-org-8024 245 6 would would MD blog-dshr-org-8024 245 7 need need VB blog-dshr-org-8024 245 8 to to TO blog-dshr-org-8024 245 9 pay pay VB blog-dshr-org-8024 245 10 for for IN blog-dshr-org-8024 245 11 their -PRON- PRP$ blog-dshr-org-8024 245 12 use use NN blog-dshr-org-8024 245 13 , , , blog-dshr-org-8024 245 14 which which WDT blog-dshr-org-8024 245 15 means mean VBZ blog-dshr-org-8024 245 16 the the DT blog-dshr-org-8024 245 17 packages package NNS blog-dshr-org-8024 245 18 could could MD blog-dshr-org-8024 245 19 neither neither CC blog-dshr-org-8024 245 20 be be VB blog-dshr-org-8024 245 21 free free JJ blog-dshr-org-8024 245 22 , , , blog-dshr-org-8024 245 23 nor nor CC blog-dshr-org-8024 245 24 open open JJ blog-dshr-org-8024 245 25 source source NN blog-dshr-org-8024 245 26 . . . blog-dshr-org-8024 246 1 Which which WDT blog-dshr-org-8024 246 2 would would MD blog-dshr-org-8024 246 3 make make VB blog-dshr-org-8024 246 4 implementing implement VBG blog-dshr-org-8024 246 5 the the DT blog-dshr-org-8024 246 6 reproducible reproducible NN blog-dshr-org-8024 246 7 builds build VBZ blog-dshr-org-8024 246 8 and and CC blog-dshr-org-8024 246 9 bootstrapped bootstrappe VBD blog-dshr-org-8024 246 10 compilers compiler NNS blog-dshr-org-8024 246 11 needed need VBN blog-dshr-org-8024 246 12 to to TO blog-dshr-org-8024 246 13 defend defend VB blog-dshr-org-8024 246 14 against against IN blog-dshr-org-8024 246 15 type type NN blog-dshr-org-8024 246 16 B b NN blog-dshr-org-8024 246 17 attacks attack NNS blog-dshr-org-8024 246 18 extremely extremely RB blog-dshr-org-8024 246 19 difficult difficult JJ blog-dshr-org-8024 246 20 . . . blog-dshr-org-8024 247 1 The the DT blog-dshr-org-8024 247 2 FOSS FOSS NNP blog-dshr-org-8024 247 3 ( ( -LRB- blog-dshr-org-8024 247 4 Free Free NNP blog-dshr-org-8024 247 5 Open open JJ blog-dshr-org-8024 247 6 Source source NN blog-dshr-org-8024 247 7 Software Software NNP blog-dshr-org-8024 247 8 ) ) -RRB- blog-dshr-org-8024 247 9 movement movement NN blog-dshr-org-8024 247 10 will will MD blog-dshr-org-8024 247 11 need need VB blog-dshr-org-8024 247 12 to to TO blog-dshr-org-8024 247 13 find find VB blog-dshr-org-8024 247 14 other other JJ blog-dshr-org-8024 247 15 ways way NNS blog-dshr-org-8024 247 16 to to TO blog-dshr-org-8024 247 17 combat combat VB blog-dshr-org-8024 247 18 Sybil Sybil NNP blog-dshr-org-8024 247 19 attacks attack NNS blog-dshr-org-8024 247 20 , , , blog-dshr-org-8024 247 21 which which WDT blog-dshr-org-8024 247 22 will will MD blog-dshr-org-8024 247 23 be be VB blog-dshr-org-8024 247 24 hard hard JJ blog-dshr-org-8024 247 25 if if IN blog-dshr-org-8024 247 26 the the DT blog-dshr-org-8024 247 27 reward reward NN blog-dshr-org-8024 247 28 for for IN blog-dshr-org-8024 247 29 a a DT blog-dshr-org-8024 247 30 successful successful JJ blog-dshr-org-8024 247 31 attack attack NN blog-dshr-org-8024 247 32 greatly greatly RB blog-dshr-org-8024 247 33 exceeds exceed VBZ blog-dshr-org-8024 247 34 the the DT blog-dshr-org-8024 247 35 cost cost NN blog-dshr-org-8024 247 36 of of IN blog-dshr-org-8024 247 37 mounting mount VBG blog-dshr-org-8024 247 38 it -PRON- PRP blog-dshr-org-8024 247 39 . . . blog-dshr-org-8024 248 1 Adequately adequately RB blog-dshr-org-8024 248 2 rewarding rewarding JJ blog-dshr-org-8024 248 3 maintainers maintainer NNS blog-dshr-org-8024 248 4 for for IN blog-dshr-org-8024 248 5 their -PRON- PRP$ blog-dshr-org-8024 248 6 essential essential JJ blog-dshr-org-8024 248 7 but but CC blog-dshr-org-8024 248 8 under under RB blog-dshr-org-8024 248 9 - - HYPH blog-dshr-org-8024 248 10 appreciated appreciate VBN blog-dshr-org-8024 248 11 efforts effort NNS blog-dshr-org-8024 248 12 is be VBZ blog-dshr-org-8024 248 13 a a DT blog-dshr-org-8024 248 14 fundamental fundamental JJ blog-dshr-org-8024 248 15 problem problem NN blog-dshr-org-8024 248 16 for for IN blog-dshr-org-8024 248 17 FOSS FOSS NNP blog-dshr-org-8024 248 18 . . . blog-dshr-org-8024 249 1 It -PRON- PRP blog-dshr-org-8024 249 2 turns turn VBZ blog-dshr-org-8024 249 3 out out RP blog-dshr-org-8024 249 4 that that IN blog-dshr-org-8024 249 5 this this DT blog-dshr-org-8024 249 6 talk talk NN blog-dshr-org-8024 249 7 is be VBZ blog-dshr-org-8024 249 8 timely timely JJ blog-dshr-org-8024 249 9 . . . blog-dshr-org-8024 250 1 Two two CD blog-dshr-org-8024 250 2 days day NNS blog-dshr-org-8024 250 3 ago ago RB blog-dshr-org-8024 250 4 , , , blog-dshr-org-8024 250 5 Eric Eric NNP blog-dshr-org-8024 250 6 Brewer Brewer NNP blog-dshr-org-8024 250 7 , , , blog-dshr-org-8024 250 8 Rob Rob NNP blog-dshr-org-8024 250 9 Pike Pike NNP blog-dshr-org-8024 250 10 et et FW blog-dshr-org-8024 250 11 al al XX blog-dshr-org-8024 250 12 from from IN blog-dshr-org-8024 250 13 Google Google NNP blog-dshr-org-8024 250 14 posted post VBD blog-dshr-org-8024 250 15 Know Know NNP blog-dshr-org-8024 250 16 , , , blog-dshr-org-8024 250 17 Prevent Prevent NNP blog-dshr-org-8024 250 18 , , , blog-dshr-org-8024 250 19 Fix fix NN blog-dshr-org-8024 250 20 : : : blog-dshr-org-8024 250 21 A a DT blog-dshr-org-8024 250 22 framework framework NN blog-dshr-org-8024 250 23 for for IN blog-dshr-org-8024 250 24 shifting shift VBG blog-dshr-org-8024 250 25 the the DT blog-dshr-org-8024 250 26 discussion discussion NN blog-dshr-org-8024 250 27 around around IN blog-dshr-org-8024 250 28 vulnerabilities vulnerability NNS blog-dshr-org-8024 250 29 in in IN blog-dshr-org-8024 250 30 open open JJ blog-dshr-org-8024 250 31 source source NN blog-dshr-org-8024 250 32 , , , blog-dshr-org-8024 250 33 an an DT blog-dshr-org-8024 250 34 important important JJ blog-dshr-org-8024 250 35 and and CC blog-dshr-org-8024 250 36 detailed detailed JJ blog-dshr-org-8024 250 37 look look NN blog-dshr-org-8024 250 38 at at IN blog-dshr-org-8024 250 39 the the DT blog-dshr-org-8024 250 40 problem problem NN blog-dshr-org-8024 250 41 of of IN blog-dshr-org-8024 250 42 vulnerabilities vulnerability NNS blog-dshr-org-8024 250 43 in in IN blog-dshr-org-8024 250 44 open open JJ blog-dshr-org-8024 250 45 source source NN blog-dshr-org-8024 250 46 and and CC blog-dshr-org-8024 250 47 what what WP blog-dshr-org-8024 250 48 can can MD blog-dshr-org-8024 250 49 be be VB blog-dshr-org-8024 250 50 done do VBN blog-dshr-org-8024 250 51 to to TO blog-dshr-org-8024 250 52 reduce reduce VB blog-dshr-org-8024 250 53 them -PRON- PRP blog-dshr-org-8024 250 54 . . . blog-dshr-org-8024 251 1 Their -PRON- PRP$ blog-dshr-org-8024 251 2 summary summary NN blog-dshr-org-8024 251 3 is be VBZ blog-dshr-org-8024 251 4 : : : blog-dshr-org-8024 251 5 It -PRON- PRP blog-dshr-org-8024 251 6 is be VBZ blog-dshr-org-8024 251 7 common common JJ blog-dshr-org-8024 251 8 for for IN blog-dshr-org-8024 251 9 a a DT blog-dshr-org-8024 251 10 program program NN blog-dshr-org-8024 251 11 to to TO blog-dshr-org-8024 251 12 depend depend VB blog-dshr-org-8024 251 13 , , , blog-dshr-org-8024 251 14 directly directly RB blog-dshr-org-8024 251 15 or or CC blog-dshr-org-8024 251 16 indirectly indirectly RB blog-dshr-org-8024 251 17 , , , blog-dshr-org-8024 251 18 on on IN blog-dshr-org-8024 251 19 thousands thousand NNS blog-dshr-org-8024 251 20 of of IN blog-dshr-org-8024 251 21 packages package NNS blog-dshr-org-8024 251 22 and and CC blog-dshr-org-8024 251 23 libraries library NNS blog-dshr-org-8024 251 24 . . . blog-dshr-org-8024 252 1 For for IN blog-dshr-org-8024 252 2 example example NN blog-dshr-org-8024 252 3 , , , blog-dshr-org-8024 252 4 Kubernetes Kubernetes NNPS blog-dshr-org-8024 252 5 now now RB blog-dshr-org-8024 252 6 depends depend VBZ blog-dshr-org-8024 252 7 on on IN blog-dshr-org-8024 252 8 about about RB blog-dshr-org-8024 252 9 1,000 1,000 CD blog-dshr-org-8024 252 10 packages package NNS blog-dshr-org-8024 252 11 . . . blog-dshr-org-8024 253 1 Open open JJ blog-dshr-org-8024 253 2 source source NN blog-dshr-org-8024 253 3 likely likely RB blog-dshr-org-8024 253 4 makes make VBZ blog-dshr-org-8024 253 5 more more JJR blog-dshr-org-8024 253 6 use use NN blog-dshr-org-8024 253 7 of of IN blog-dshr-org-8024 253 8 dependencies dependency NNS blog-dshr-org-8024 253 9 than than IN blog-dshr-org-8024 253 10 closed close VBN blog-dshr-org-8024 253 11 source source NN blog-dshr-org-8024 253 12 , , , blog-dshr-org-8024 253 13 and and CC blog-dshr-org-8024 253 14 from from IN blog-dshr-org-8024 253 15 a a DT blog-dshr-org-8024 253 16 wider wide JJR blog-dshr-org-8024 253 17 range range NN blog-dshr-org-8024 253 18 of of IN blog-dshr-org-8024 253 19 suppliers supplier NNS blog-dshr-org-8024 253 20 ; ; : blog-dshr-org-8024 253 21 the the DT blog-dshr-org-8024 253 22 number number NN blog-dshr-org-8024 253 23 of of IN blog-dshr-org-8024 253 24 distinct distinct JJ blog-dshr-org-8024 253 25 entities entity NNS blog-dshr-org-8024 253 26 that that WDT blog-dshr-org-8024 253 27 need need VBP blog-dshr-org-8024 253 28 to to TO blog-dshr-org-8024 253 29 be be VB blog-dshr-org-8024 253 30 trusted trust VBN blog-dshr-org-8024 253 31 can can MD blog-dshr-org-8024 253 32 be be VB blog-dshr-org-8024 253 33 very very RB blog-dshr-org-8024 253 34 high high JJ blog-dshr-org-8024 253 35 . . . blog-dshr-org-8024 254 1 This this DT blog-dshr-org-8024 254 2 makes make VBZ blog-dshr-org-8024 254 3 it -PRON- PRP blog-dshr-org-8024 254 4 extremely extremely RB blog-dshr-org-8024 254 5 difficult difficult JJ blog-dshr-org-8024 254 6 to to TO blog-dshr-org-8024 254 7 understand understand VB blog-dshr-org-8024 254 8 how how WRB blog-dshr-org-8024 254 9 open open JJ blog-dshr-org-8024 254 10 source source NN blog-dshr-org-8024 254 11 is be VBZ blog-dshr-org-8024 254 12 used use VBN blog-dshr-org-8024 254 13 in in IN blog-dshr-org-8024 254 14 products product NNS blog-dshr-org-8024 254 15 and and CC blog-dshr-org-8024 254 16 what what WDT blog-dshr-org-8024 254 17 vulnerabilities vulnerability NNS blog-dshr-org-8024 254 18 might may MD blog-dshr-org-8024 254 19 be be VB blog-dshr-org-8024 254 20 relevant relevant JJ blog-dshr-org-8024 254 21 . . . blog-dshr-org-8024 255 1 There there EX blog-dshr-org-8024 255 2 is be VBZ blog-dshr-org-8024 255 3 also also RB blog-dshr-org-8024 255 4 no no DT blog-dshr-org-8024 255 5 assurance assurance NN blog-dshr-org-8024 255 6 that that IN blog-dshr-org-8024 255 7 what what WP blog-dshr-org-8024 255 8 is be VBZ blog-dshr-org-8024 255 9 built build VBN blog-dshr-org-8024 255 10 matches match NNS blog-dshr-org-8024 255 11 the the DT blog-dshr-org-8024 255 12 source source NN blog-dshr-org-8024 255 13 code code NN blog-dshr-org-8024 255 14 . . . blog-dshr-org-8024 256 1 Taking take VBG blog-dshr-org-8024 256 2 a a DT blog-dshr-org-8024 256 3 step step NN blog-dshr-org-8024 256 4 back back RB blog-dshr-org-8024 256 5 , , , blog-dshr-org-8024 256 6 although although IN blog-dshr-org-8024 256 7 supply supply NN blog-dshr-org-8024 256 8 - - HYPH blog-dshr-org-8024 256 9 chain chain NN blog-dshr-org-8024 256 10 attacks attack NNS blog-dshr-org-8024 256 11 are be VBP blog-dshr-org-8024 256 12 a a DT blog-dshr-org-8024 256 13 risk risk NN blog-dshr-org-8024 256 14 , , , blog-dshr-org-8024 256 15 the the DT blog-dshr-org-8024 256 16 vast vast JJ blog-dshr-org-8024 256 17 majority majority NN blog-dshr-org-8024 256 18 of of IN blog-dshr-org-8024 256 19 vulnerabilities vulnerability NNS blog-dshr-org-8024 256 20 are be VBP blog-dshr-org-8024 256 21 mundane mundane JJ blog-dshr-org-8024 256 22 and and CC blog-dshr-org-8024 256 23 unintentional unintentional JJ blog-dshr-org-8024 256 24 — — : blog-dshr-org-8024 256 25 honest honest JJ blog-dshr-org-8024 256 26 errors error NNS blog-dshr-org-8024 256 27 made make VBN blog-dshr-org-8024 256 28 by by IN blog-dshr-org-8024 256 29 well well RB blog-dshr-org-8024 256 30 - - HYPH blog-dshr-org-8024 256 31 intentioned intentione VBN blog-dshr-org-8024 256 32 developers developer NNS blog-dshr-org-8024 256 33 . . . blog-dshr-org-8024 257 1 Furthermore furthermore RB blog-dshr-org-8024 257 2 , , , blog-dshr-org-8024 257 3 bad bad JJ blog-dshr-org-8024 257 4 actors actor NNS blog-dshr-org-8024 257 5 are be VBP blog-dshr-org-8024 257 6 more more RBR blog-dshr-org-8024 257 7 likely likely JJ blog-dshr-org-8024 257 8 to to TO blog-dshr-org-8024 257 9 exploit exploit VB blog-dshr-org-8024 257 10 known known JJ blog-dshr-org-8024 257 11 vulnerabilities vulnerability NNS blog-dshr-org-8024 257 12 than than IN blog-dshr-org-8024 257 13 to to TO blog-dshr-org-8024 257 14 find find VB blog-dshr-org-8024 257 15 their -PRON- PRP$ blog-dshr-org-8024 257 16 own own JJ blog-dshr-org-8024 257 17 : : : blog-dshr-org-8024 257 18 it -PRON- PRP blog-dshr-org-8024 257 19 ’s ’ VBZ blog-dshr-org-8024 257 20 just just RB blog-dshr-org-8024 257 21 easier easy JJR blog-dshr-org-8024 257 22 . . . blog-dshr-org-8024 258 1 As as IN blog-dshr-org-8024 258 2 such such JJ blog-dshr-org-8024 258 3 , , , blog-dshr-org-8024 258 4 we -PRON- PRP blog-dshr-org-8024 258 5 must must MD blog-dshr-org-8024 258 6 focus focus VB blog-dshr-org-8024 258 7 on on IN blog-dshr-org-8024 258 8 making make VBG blog-dshr-org-8024 258 9 fundamental fundamental JJ blog-dshr-org-8024 258 10 changes change NNS blog-dshr-org-8024 258 11 to to TO blog-dshr-org-8024 258 12 address address VB blog-dshr-org-8024 258 13 the the DT blog-dshr-org-8024 258 14 majority majority NN blog-dshr-org-8024 258 15 of of IN blog-dshr-org-8024 258 16 vulnerabilities vulnerability NNS blog-dshr-org-8024 258 17 , , , blog-dshr-org-8024 258 18 as as IN blog-dshr-org-8024 258 19 doing do VBG blog-dshr-org-8024 258 20 so so RB blog-dshr-org-8024 258 21 will will MD blog-dshr-org-8024 258 22 move move VB blog-dshr-org-8024 258 23 the the DT blog-dshr-org-8024 258 24 entire entire JJ blog-dshr-org-8024 258 25 industry industry NN blog-dshr-org-8024 258 26 far far RB blog-dshr-org-8024 258 27 along along RB blog-dshr-org-8024 258 28 in in IN blog-dshr-org-8024 258 29 addressing address VBG blog-dshr-org-8024 258 30 the the DT blog-dshr-org-8024 258 31 complex complex JJ blog-dshr-org-8024 258 32 cases case NNS blog-dshr-org-8024 258 33 as as RB blog-dshr-org-8024 258 34 well well RB blog-dshr-org-8024 258 35 , , , blog-dshr-org-8024 258 36 including include VBG blog-dshr-org-8024 258 37 supply supply NN blog-dshr-org-8024 258 38 - - HYPH blog-dshr-org-8024 258 39 chain chain NN blog-dshr-org-8024 258 40 attacks attack NNS blog-dshr-org-8024 258 41 . . . blog-dshr-org-8024 259 1 The the DT blog-dshr-org-8024 259 2 bulk bulk NN blog-dshr-org-8024 259 3 of of IN blog-dshr-org-8024 259 4 their -PRON- PRP$ blog-dshr-org-8024 259 5 post post NN blog-dshr-org-8024 259 6 addresses address NNS blog-dshr-org-8024 259 7 improvements improvement NNS blog-dshr-org-8024 259 8 to to IN blog-dshr-org-8024 259 9 the the DT blog-dshr-org-8024 259 10 quality quality NN blog-dshr-org-8024 259 11 of of IN blog-dshr-org-8024 259 12 the the DT blog-dshr-org-8024 259 13 development development NN blog-dshr-org-8024 259 14 process process NN blog-dshr-org-8024 259 15 , , , blog-dshr-org-8024 259 16 with with IN blog-dshr-org-8024 259 17 three three CD blog-dshr-org-8024 259 18 goals goal NNS blog-dshr-org-8024 259 19 : : : blog-dshr-org-8024 259 20 Know know VB blog-dshr-org-8024 259 21 about about IN blog-dshr-org-8024 259 22 the the DT blog-dshr-org-8024 259 23 vulnerabilities vulnerability NNS blog-dshr-org-8024 259 24 in in IN blog-dshr-org-8024 259 25 your -PRON- PRP$ blog-dshr-org-8024 259 26 software software NN blog-dshr-org-8024 259 27 Prevent prevent VB blog-dshr-org-8024 259 28 the the DT blog-dshr-org-8024 259 29 addition addition NN blog-dshr-org-8024 259 30 of of IN blog-dshr-org-8024 259 31 new new JJ blog-dshr-org-8024 259 32 vulnerabilities vulnerability NNS blog-dshr-org-8024 259 33 , , , blog-dshr-org-8024 259 34 and and CC blog-dshr-org-8024 259 35 Fix fix VB blog-dshr-org-8024 259 36 or or CC blog-dshr-org-8024 259 37 remove remove VB blog-dshr-org-8024 259 38 vulnerabilities vulnerability NNS blog-dshr-org-8024 259 39 . . . blog-dshr-org-8024 260 1 Then then RB blog-dshr-org-8024 260 2 , , , blog-dshr-org-8024 260 3 in in IN blog-dshr-org-8024 260 4 a a DT blog-dshr-org-8024 260 5 section section NN blog-dshr-org-8024 260 6 entitled entitle VBN blog-dshr-org-8024 260 7 Prevention Prevention NNP blog-dshr-org-8024 260 8 for for IN blog-dshr-org-8024 260 9 Critical Critical NNP blog-dshr-org-8024 260 10 Software Software NNP blog-dshr-org-8024 260 11 they -PRON- PRP blog-dshr-org-8024 260 12 specifially specifially RB blog-dshr-org-8024 260 13 address address VBP blog-dshr-org-8024 260 14 the the DT blog-dshr-org-8024 260 15 security security NN blog-dshr-org-8024 260 16 of of IN blog-dshr-org-8024 260 17 the the DT blog-dshr-org-8024 260 18 development development NN blog-dshr-org-8024 260 19 process process NN blog-dshr-org-8024 260 20 and and CC blog-dshr-org-8024 260 21 thus thus RB blog-dshr-org-8024 260 22 the the DT blog-dshr-org-8024 260 23 two two CD blog-dshr-org-8024 260 24 types type NNS blog-dshr-org-8024 260 25 of of IN blog-dshr-org-8024 260 26 supply supply NN blog-dshr-org-8024 260 27 chain chain NN blog-dshr-org-8024 260 28 attacks attack NNS blog-dshr-org-8024 260 29 we -PRON- PRP blog-dshr-org-8024 260 30 have have VBP blog-dshr-org-8024 260 31 been be VBN blog-dshr-org-8024 260 32 discussing discuss VBG blog-dshr-org-8024 260 33 . . . blog-dshr-org-8024 261 1 They -PRON- PRP blog-dshr-org-8024 261 2 write write VBP blog-dshr-org-8024 261 3 : : : blog-dshr-org-8024 261 4 This this DT blog-dshr-org-8024 261 5 is be VBZ blog-dshr-org-8024 261 6 a a DT blog-dshr-org-8024 261 7 big big JJ blog-dshr-org-8024 261 8 task task NN blog-dshr-org-8024 261 9 , , , blog-dshr-org-8024 261 10 and and CC blog-dshr-org-8024 261 11 currently currently RB blog-dshr-org-8024 261 12 unrealistic unrealistic JJ blog-dshr-org-8024 261 13 for for IN blog-dshr-org-8024 261 14 the the DT blog-dshr-org-8024 261 15 majority majority NN blog-dshr-org-8024 261 16 of of IN blog-dshr-org-8024 261 17 open open JJ blog-dshr-org-8024 261 18 source source NN blog-dshr-org-8024 261 19 . . . blog-dshr-org-8024 262 1 Part part NN blog-dshr-org-8024 262 2 of of IN blog-dshr-org-8024 262 3 the the DT blog-dshr-org-8024 262 4 beauty beauty NN blog-dshr-org-8024 262 5 of of IN blog-dshr-org-8024 262 6 open open JJ blog-dshr-org-8024 262 7 source source NN blog-dshr-org-8024 262 8 is be VBZ blog-dshr-org-8024 262 9 its -PRON- PRP$ blog-dshr-org-8024 262 10 lack lack NN blog-dshr-org-8024 262 11 of of IN blog-dshr-org-8024 262 12 constraints constraint NNS blog-dshr-org-8024 262 13 on on IN blog-dshr-org-8024 262 14 the the DT blog-dshr-org-8024 262 15 process process NN blog-dshr-org-8024 262 16 , , , blog-dshr-org-8024 262 17 which which WDT blog-dshr-org-8024 262 18 encourages encourage VBZ blog-dshr-org-8024 262 19 a a DT blog-dshr-org-8024 262 20 wide wide JJ blog-dshr-org-8024 262 21 range range NN blog-dshr-org-8024 262 22 of of IN blog-dshr-org-8024 262 23 contributors contributor NNS blog-dshr-org-8024 262 24 . . . blog-dshr-org-8024 263 1 However however RB blog-dshr-org-8024 263 2 , , , blog-dshr-org-8024 263 3 that that DT blog-dshr-org-8024 263 4 flexibility flexibility NN blog-dshr-org-8024 263 5 can can MD blog-dshr-org-8024 263 6 hinder hinder VB blog-dshr-org-8024 263 7 security security NN blog-dshr-org-8024 263 8 considerations consideration NNS blog-dshr-org-8024 263 9 . . . blog-dshr-org-8024 264 1 We -PRON- PRP blog-dshr-org-8024 264 2 want want VBP blog-dshr-org-8024 264 3 contributors contributor NNS blog-dshr-org-8024 264 4 , , , blog-dshr-org-8024 264 5 but but CC blog-dshr-org-8024 264 6 we -PRON- PRP blog-dshr-org-8024 264 7 can can MD blog-dshr-org-8024 264 8 not not RB blog-dshr-org-8024 264 9 expect expect VB blog-dshr-org-8024 264 10 everyone everyone NN blog-dshr-org-8024 264 11 to to TO blog-dshr-org-8024 264 12 be be VB blog-dshr-org-8024 264 13 equally equally RB blog-dshr-org-8024 264 14 focused focused JJ blog-dshr-org-8024 264 15 on on IN blog-dshr-org-8024 264 16 security security NN blog-dshr-org-8024 264 17 . . . blog-dshr-org-8024 265 1 Instead instead RB blog-dshr-org-8024 265 2 , , , blog-dshr-org-8024 265 3 we -PRON- PRP blog-dshr-org-8024 265 4 must must MD blog-dshr-org-8024 265 5 identify identify VB blog-dshr-org-8024 265 6 critical critical JJ blog-dshr-org-8024 265 7 packages package NNS blog-dshr-org-8024 265 8 and and CC blog-dshr-org-8024 265 9 protect protect VB blog-dshr-org-8024 265 10 them -PRON- PRP blog-dshr-org-8024 265 11 . . . blog-dshr-org-8024 266 1 Such such JJ blog-dshr-org-8024 266 2 critical critical JJ blog-dshr-org-8024 266 3 packages package NNS blog-dshr-org-8024 266 4 must must MD blog-dshr-org-8024 266 5 be be VB blog-dshr-org-8024 266 6 held hold VBN blog-dshr-org-8024 266 7 to to IN blog-dshr-org-8024 266 8 a a DT blog-dshr-org-8024 266 9 range range NN blog-dshr-org-8024 266 10 of of IN blog-dshr-org-8024 266 11 higher high JJR blog-dshr-org-8024 266 12 development development NN blog-dshr-org-8024 266 13 standards standard NNS blog-dshr-org-8024 266 14 , , , blog-dshr-org-8024 266 15 even even RB blog-dshr-org-8024 266 16 though though IN blog-dshr-org-8024 266 17 that that DT blog-dshr-org-8024 266 18 might may MD blog-dshr-org-8024 266 19 add add VB blog-dshr-org-8024 266 20 developer developer NN blog-dshr-org-8024 266 21 friction friction NN blog-dshr-org-8024 266 22 . . . blog-dshr-org-8024 267 1 [ [ -LRB- blog-dshr-org-8024 267 2 Slide slide NN blog-dshr-org-8024 267 3 16 16 CD blog-dshr-org-8024 267 4 ] ] -RRB- blog-dshr-org-8024 267 5 Define Define NNP blog-dshr-org-8024 267 6 Criteria Criteria NNP blog-dshr-org-8024 267 7 for for IN blog-dshr-org-8024 267 8 “ " `` blog-dshr-org-8024 267 9 Critical critical JJ blog-dshr-org-8024 267 10 ” " '' blog-dshr-org-8024 267 11 Open Open NNP blog-dshr-org-8024 267 12 Source source NN blog-dshr-org-8024 267 13 Projects project NNS blog-dshr-org-8024 267 14 that that WDT blog-dshr-org-8024 267 15 Merit Merit NNP blog-dshr-org-8024 267 16 Higher high JJR blog-dshr-org-8024 267 17 Standards Standards NNPS blog-dshr-org-8024 267 18 No No NNP blog-dshr-org-8024 267 19 Unilateral Unilateral NNP blog-dshr-org-8024 267 20 Changes Changes NNPS blog-dshr-org-8024 267 21 to to IN blog-dshr-org-8024 267 22 Critical Critical NNP blog-dshr-org-8024 267 23 Software Software NNP blog-dshr-org-8024 267 24 Require Require NNP blog-dshr-org-8024 267 25 Code Code NNP blog-dshr-org-8024 267 26 Review Review NNP blog-dshr-org-8024 267 27 for for IN blog-dshr-org-8024 267 28 Critical Critical NNP blog-dshr-org-8024 267 29 Software Software NNP blog-dshr-org-8024 267 30 Changes Changes NNPS blog-dshr-org-8024 267 31 to to IN blog-dshr-org-8024 267 32 Critical Critical NNP blog-dshr-org-8024 267 33 Software software NN blog-dshr-org-8024 267 34 Require require VBP blog-dshr-org-8024 267 35 Approval approval NN blog-dshr-org-8024 267 36 by by IN blog-dshr-org-8024 267 37 Two two CD blog-dshr-org-8024 267 38 Independent Independent NNP blog-dshr-org-8024 267 39 Parties Parties NNPS blog-dshr-org-8024 267 40 Authentication Authentication NNP blog-dshr-org-8024 267 41 for for IN blog-dshr-org-8024 267 42 Participants participant NNS blog-dshr-org-8024 267 43 in in IN blog-dshr-org-8024 267 44 Critical critical JJ blog-dshr-org-8024 267 45 Software Software NNP blog-dshr-org-8024 267 46 For for IN blog-dshr-org-8024 267 47 Critical Critical NNP blog-dshr-org-8024 267 48 Software Software NNP blog-dshr-org-8024 267 49 , , , blog-dshr-org-8024 267 50 Owners Owners NNPS blog-dshr-org-8024 267 51 and and CC blog-dshr-org-8024 267 52 Maintainers Maintainers NNPS blog-dshr-org-8024 267 53 Can can MD blog-dshr-org-8024 267 54 not not RB blog-dshr-org-8024 267 55 be be VB blog-dshr-org-8024 267 56 Anonymous Anonymous NNP blog-dshr-org-8024 267 57 Strong Strong NNP blog-dshr-org-8024 267 58 Authentication Authentication NNP blog-dshr-org-8024 267 59 for for IN blog-dshr-org-8024 267 60 Contributors contributor NNS blog-dshr-org-8024 267 61 of of IN blog-dshr-org-8024 267 62 Critical Critical NNP blog-dshr-org-8024 267 63 Software Software NNP blog-dshr-org-8024 267 64 A A NNP blog-dshr-org-8024 267 65 Federated Federated NNP blog-dshr-org-8024 267 66 Model Model NNP blog-dshr-org-8024 267 67 for for IN blog-dshr-org-8024 267 68 Identities Identities NNP blog-dshr-org-8024 267 69 Notification Notification NNP blog-dshr-org-8024 267 70 for for IN blog-dshr-org-8024 267 71 Changes Changes NNPS blog-dshr-org-8024 267 72 in in IN blog-dshr-org-8024 267 73 Risk Risk NNP blog-dshr-org-8024 267 74 Transparency transparency NN blog-dshr-org-8024 267 75 for for IN blog-dshr-org-8024 267 76 Artifacts Artifacts NNPS blog-dshr-org-8024 267 77 Trust Trust NNP blog-dshr-org-8024 267 78 the the DT blog-dshr-org-8024 267 79 Build build NN blog-dshr-org-8024 267 80 Process process NN blog-dshr-org-8024 267 81 Their -PRON- PRP$ blog-dshr-org-8024 267 82 goals goal NNS blog-dshr-org-8024 267 83 for for IN blog-dshr-org-8024 267 84 the the DT blog-dshr-org-8024 267 85 " " `` blog-dshr-org-8024 267 86 higher high JJR blog-dshr-org-8024 267 87 development development NN blog-dshr-org-8024 267 88 standards standard NNS blog-dshr-org-8024 267 89 " " '' blog-dshr-org-8024 267 90 include include VBP blog-dshr-org-8024 267 91 identifying identify VBG blog-dshr-org-8024 267 92 the the DT blog-dshr-org-8024 267 93 important important JJ blog-dshr-org-8024 267 94 packages package NNS blog-dshr-org-8024 267 95 that that WDT blog-dshr-org-8024 267 96 require require VBP blog-dshr-org-8024 267 97 higher high JJR blog-dshr-org-8024 267 98 standards standard NNS blog-dshr-org-8024 267 99 , , , blog-dshr-org-8024 267 100 implementing implement VBG blog-dshr-org-8024 267 101 review review NN blog-dshr-org-8024 267 102 and and CC blog-dshr-org-8024 267 103 signoff signoff NN blog-dshr-org-8024 267 104 of of IN blog-dshr-org-8024 267 105 changes change NNS blog-dshr-org-8024 267 106 by by IN blog-dshr-org-8024 267 107 at at RB blog-dshr-org-8024 267 108 least least RBS blog-dshr-org-8024 267 109 two two CD blog-dshr-org-8024 267 110 independent independent JJ blog-dshr-org-8024 267 111 developers developer NNS blog-dshr-org-8024 267 112 , , , blog-dshr-org-8024 267 113 " " '' blog-dshr-org-8024 267 114 transparency transparency NN blog-dshr-org-8024 267 115 for for IN blog-dshr-org-8024 267 116 artifacts artifact NNS blog-dshr-org-8024 267 117 " " '' blog-dshr-org-8024 267 118 , , , blog-dshr-org-8024 267 119 by by IN blog-dshr-org-8024 267 120 which which WDT blog-dshr-org-8024 267 121 they -PRON- PRP blog-dshr-org-8024 267 122 mean mean VBP blog-dshr-org-8024 267 123 reproducible reproducible NN blog-dshr-org-8024 267 124 builds build VBZ blog-dshr-org-8024 267 125 , , , blog-dshr-org-8024 267 126 and and CC blog-dshr-org-8024 267 127 " " `` blog-dshr-org-8024 267 128 trust trust VB blog-dshr-org-8024 267 129 the the DT blog-dshr-org-8024 267 130 build build NN blog-dshr-org-8024 267 131 process process NN blog-dshr-org-8024 267 132 " " '' blog-dshr-org-8024 267 133 which which WDT blog-dshr-org-8024 267 134 implies imply VBZ blog-dshr-org-8024 267 135 a a DT blog-dshr-org-8024 267 136 bootstrappable bootstrappable JJ blog-dshr-org-8024 267 137 toolchain toolchain NN blog-dshr-org-8024 267 138 . . . blog-dshr-org-8024 268 1 They -PRON- PRP blog-dshr-org-8024 268 2 acknowledge acknowledge VBP blog-dshr-org-8024 268 3 that that IN blog-dshr-org-8024 268 4 these these DT blog-dshr-org-8024 268 5 are be VBP blog-dshr-org-8024 268 6 very very RB blog-dshr-org-8024 268 7 aggressive aggressive JJ blog-dshr-org-8024 268 8 goals goal NNS blog-dshr-org-8024 268 9 , , , blog-dshr-org-8024 268 10 because because IN blog-dshr-org-8024 268 11 in in IN blog-dshr-org-8024 268 12 many many JJ blog-dshr-org-8024 268 13 ways way NNS blog-dshr-org-8024 268 14 they -PRON- PRP blog-dshr-org-8024 268 15 cut cut VBD blog-dshr-org-8024 268 16 against against IN blog-dshr-org-8024 268 17 the the DT blog-dshr-org-8024 268 18 free free RB blog-dshr-org-8024 268 19 - - HYPH blog-dshr-org-8024 268 20 wheeling wheel VBG blog-dshr-org-8024 268 21 development development NN blog-dshr-org-8024 268 22 culture culture NN blog-dshr-org-8024 268 23 of of IN blog-dshr-org-8024 268 24 open open JJ blog-dshr-org-8024 268 25 source source NN blog-dshr-org-8024 268 26 that that WDT blog-dshr-org-8024 268 27 has have VBZ blog-dshr-org-8024 268 28 sparked spark VBN blog-dshr-org-8024 268 29 its -PRON- PRP$ blog-dshr-org-8024 268 30 remarkable remarkable JJ blog-dshr-org-8024 268 31 productivity productivity NN blog-dshr-org-8024 268 32 . . . blog-dshr-org-8024 269 1 If if IN blog-dshr-org-8024 269 2 Google Google NNP blog-dshr-org-8024 269 3 were be VBD blog-dshr-org-8024 269 4 to to TO blog-dshr-org-8024 269 5 persuade persuade VB blog-dshr-org-8024 269 6 other other JJ blog-dshr-org-8024 269 7 major major JJ blog-dshr-org-8024 269 8 corporations corporation NNS blog-dshr-org-8024 269 9 to to TO blog-dshr-org-8024 269 10 put put VB blog-dshr-org-8024 269 11 significant significant JJ blog-dshr-org-8024 269 12 additional additional JJ blog-dshr-org-8024 269 13 resources resource NNS blog-dshr-org-8024 269 14 of of IN blog-dshr-org-8024 269 15 money money NN blog-dshr-org-8024 269 16 and and CC blog-dshr-org-8024 269 17 manpower manpower NN blog-dshr-org-8024 269 18 into into IN blog-dshr-org-8024 269 19 implementing implement VBG blog-dshr-org-8024 269 20 them -PRON- PRP blog-dshr-org-8024 269 21 they -PRON- PRP blog-dshr-org-8024 269 22 would would MD blog-dshr-org-8024 269 23 likely likely RB blog-dshr-org-8024 269 24 succeed succeed VB blog-dshr-org-8024 269 25 . . . blog-dshr-org-8024 270 1 Absent absent VB blog-dshr-org-8024 270 2 this this DT blog-dshr-org-8024 270 3 , , , blog-dshr-org-8024 270 4 the the DT blog-dshr-org-8024 270 5 additional additional JJ blog-dshr-org-8024 270 6 load load NN blog-dshr-org-8024 270 7 on on IN blog-dshr-org-8024 270 8 developers developer NNS blog-dshr-org-8024 270 9 will will MD blog-dshr-org-8024 270 10 likely likely RB blog-dshr-org-8024 270 11 cause cause VB blog-dshr-org-8024 270 12 resistance resistance NN blog-dshr-org-8024 270 13 . . . blog-dshr-org-8024 271 1 Posted post VBN blog-dshr-org-8024 271 2 by by IN blog-dshr-org-8024 271 3 David David NNP blog-dshr-org-8024 271 4 . . . blog-dshr-org-8024 272 1 at at IN blog-dshr-org-8024 272 2 6:00 6:00 CD blog-dshr-org-8024 272 3 PM pm NN blog-dshr-org-8024 272 4 Labels Labels NNPS blog-dshr-org-8024 272 5 : : : blog-dshr-org-8024 272 6 security security NN blog-dshr-org-8024 272 7 No no DT blog-dshr-org-8024 272 8 comments comment NNS blog-dshr-org-8024 272 9 : : : blog-dshr-org-8024 272 10 Post post VB blog-dshr-org-8024 272 11 a a DT blog-dshr-org-8024 272 12 Comment Comment NNP blog-dshr-org-8024 272 13 Older Older NNP blog-dshr-org-8024 272 14 Post Post NNP blog-dshr-org-8024 272 15 Home Home NNP blog-dshr-org-8024 272 16 Subscribe Subscribe NNP blog-dshr-org-8024 272 17 to to TO blog-dshr-org-8024 272 18 : : : blog-dshr-org-8024 272 19 Post Post NNP blog-dshr-org-8024 272 20 Comments comment NNS blog-dshr-org-8024 272 21 ( ( -LRB- blog-dshr-org-8024 272 22 Atom atom NN blog-dshr-org-8024 272 23 ) ) -RRB- blog-dshr-org-8024 272 24 Blog Blog NNP blog-dshr-org-8024 272 25 Rules rule NNS blog-dshr-org-8024 272 26 Posts post NNS blog-dshr-org-8024 272 27 and and CC blog-dshr-org-8024 272 28 comments comment NNS blog-dshr-org-8024 272 29 are be VBP blog-dshr-org-8024 272 30 copyright copyright NN blog-dshr-org-8024 272 31 of of IN blog-dshr-org-8024 272 32 their -PRON- PRP$ blog-dshr-org-8024 272 33 respective respective JJ blog-dshr-org-8024 272 34 authors author NNS blog-dshr-org-8024 272 35 who who WP blog-dshr-org-8024 272 36 , , , blog-dshr-org-8024 272 37 by by IN blog-dshr-org-8024 272 38 posting post VBG blog-dshr-org-8024 272 39 or or CC blog-dshr-org-8024 272 40 commenting comment VBG blog-dshr-org-8024 272 41 , , , blog-dshr-org-8024 272 42 license license VBP blog-dshr-org-8024 272 43 their -PRON- PRP$ blog-dshr-org-8024 272 44 work work NN blog-dshr-org-8024 272 45 under under IN blog-dshr-org-8024 272 46 a a DT blog-dshr-org-8024 272 47 Creative Creative NNP blog-dshr-org-8024 272 48 Commons Commons NNP blog-dshr-org-8024 272 49 Attribution Attribution NNP blog-dshr-org-8024 272 50 - - HYPH blog-dshr-org-8024 272 51 Share Share NNP blog-dshr-org-8024 272 52 Alike alike RB blog-dshr-org-8024 272 53 3.0 3.0 CD blog-dshr-org-8024 272 54 United United NNP blog-dshr-org-8024 272 55 States States NNP blog-dshr-org-8024 272 56 License License NNP blog-dshr-org-8024 272 57 . . . blog-dshr-org-8024 273 1 Off off IN blog-dshr-org-8024 273 2 - - HYPH blog-dshr-org-8024 273 3 topic topic NN blog-dshr-org-8024 273 4 or or CC blog-dshr-org-8024 273 5 unsuitable unsuitable JJ blog-dshr-org-8024 273 6 comments comment NNS blog-dshr-org-8024 273 7 will will MD blog-dshr-org-8024 273 8 be be VB blog-dshr-org-8024 273 9 deleted delete VBN blog-dshr-org-8024 273 10 . . . blog-dshr-org-8024 274 1 DSHR DSHR NNP blog-dshr-org-8024 274 2 DSHR DSHR NNP blog-dshr-org-8024 274 3 in in IN blog-dshr-org-8024 274 4 ANWR ANWR NNP blog-dshr-org-8024 274 5 Recent recent JJ blog-dshr-org-8024 274 6 Comments comment NNS blog-dshr-org-8024 274 7 Full full JJ blog-dshr-org-8024 274 8 comments comment NNS blog-dshr-org-8024 274 9 Blog Blog NNP blog-dshr-org-8024 274 10 Archive Archive NNP blog-dshr-org-8024 274 11 ▼ ▼ NNP blog-dshr-org-8024 274 12     _SP blog-dshr-org-8024 274 13 2021 2021 CD blog-dshr-org-8024 274 14 ( ( -LRB- blog-dshr-org-8024 274 15 7 7 CD blog-dshr-org-8024 274 16 ) ) -RRB- blog-dshr-org-8024 274 17 ▼ ▼ CD blog-dshr-org-8024 274 18     _SP blog-dshr-org-8024 274 19 February February NNP blog-dshr-org-8024 274 20 ( ( -LRB- blog-dshr-org-8024 274 21 2 2 LS blog-dshr-org-8024 274 22 ) ) -RRB- blog-dshr-org-8024 274 23 Talk talk VB blog-dshr-org-8024 274 24 At at IN blog-dshr-org-8024 274 25 Berkeley Berkeley NNP blog-dshr-org-8024 274 26 's 's POS blog-dshr-org-8024 274 27 Information Information NNP blog-dshr-org-8024 274 28 Access Access NNP blog-dshr-org-8024 274 29 Seminar Seminar NNP blog-dshr-org-8024 274 30 Chromebook Chromebook NNP blog-dshr-org-8024 274 31 Linux Linux NNP blog-dshr-org-8024 274 32 Update Update NNP blog-dshr-org-8024 274 33 ► ► NNP blog-dshr-org-8024 274 34     _SP blog-dshr-org-8024 274 35 January January NNP blog-dshr-org-8024 274 36 ( ( -LRB- blog-dshr-org-8024 274 37 5 5 CD blog-dshr-org-8024 274 38 ) ) -RRB- blog-dshr-org-8024 274 39 ► ► CD blog-dshr-org-8024 274 40     _SP blog-dshr-org-8024 274 41 2020 2020 CD blog-dshr-org-8024 274 42 ( ( -LRB- blog-dshr-org-8024 274 43 55 55 CD blog-dshr-org-8024 274 44 ) ) -RRB- blog-dshr-org-8024 274 45 ► ► NFP blog-dshr-org-8024 274 46     _SP blog-dshr-org-8024 274 47 December December NNP blog-dshr-org-8024 274 48 ( ( -LRB- blog-dshr-org-8024 274 49 4 4 CD blog-dshr-org-8024 274 50 ) ) -RRB- blog-dshr-org-8024 274 51 ► ► NFP blog-dshr-org-8024 274 52     _SP blog-dshr-org-8024 274 53 November November NNP blog-dshr-org-8024 274 54 ( ( -LRB- blog-dshr-org-8024 274 55 4 4 CD blog-dshr-org-8024 274 56 ) ) -RRB- blog-dshr-org-8024 274 57 ► ► NFP blog-dshr-org-8024 274 58     _SP blog-dshr-org-8024 274 59 October October NNP blog-dshr-org-8024 274 60 ( ( -LRB- blog-dshr-org-8024 274 61 3 3 CD blog-dshr-org-8024 274 62 ) ) -RRB- blog-dshr-org-8024 274 63 ► ► NFP blog-dshr-org-8024 274 64     _SP blog-dshr-org-8024 274 65 September September NNP blog-dshr-org-8024 274 66 ( ( -LRB- blog-dshr-org-8024 274 67 6 6 CD blog-dshr-org-8024 274 68 ) ) -RRB- blog-dshr-org-8024 274 69 ► ► NFP blog-dshr-org-8024 274 70     _SP blog-dshr-org-8024 274 71 August August NNP blog-dshr-org-8024 274 72 ( ( -LRB- blog-dshr-org-8024 274 73 5 5 CD blog-dshr-org-8024 274 74 ) ) -RRB- blog-dshr-org-8024 274 75 ► ► NFP blog-dshr-org-8024 274 76     _SP blog-dshr-org-8024 274 77 July July NNP blog-dshr-org-8024 274 78 ( ( -LRB- blog-dshr-org-8024 274 79 3 3 CD blog-dshr-org-8024 274 80 ) ) -RRB- blog-dshr-org-8024 274 81 ► ► NFP blog-dshr-org-8024 274 82     _SP blog-dshr-org-8024 274 83 June June NNP blog-dshr-org-8024 274 84 ( ( -LRB- blog-dshr-org-8024 274 85 6 6 CD blog-dshr-org-8024 274 86 ) ) -RRB- blog-dshr-org-8024 274 87 ► ► NFP blog-dshr-org-8024 274 88     _SP blog-dshr-org-8024 274 89 May May NNP blog-dshr-org-8024 274 90 ( ( -LRB- blog-dshr-org-8024 274 91 3 3 CD blog-dshr-org-8024 274 92 ) ) -RRB- blog-dshr-org-8024 274 93 ► ► NFP blog-dshr-org-8024 274 94     _SP blog-dshr-org-8024 274 95 April April NNP blog-dshr-org-8024 274 96 ( ( -LRB- blog-dshr-org-8024 274 97 5 5 CD blog-dshr-org-8024 274 98 ) ) -RRB- blog-dshr-org-8024 274 99 ► ► NFP blog-dshr-org-8024 274 100     _SP blog-dshr-org-8024 274 101 March March NNP blog-dshr-org-8024 274 102 ( ( -LRB- blog-dshr-org-8024 274 103 6 6 CD blog-dshr-org-8024 274 104 ) ) -RRB- blog-dshr-org-8024 274 105 ► ► NFP blog-dshr-org-8024 274 106     _SP blog-dshr-org-8024 274 107 February February NNP blog-dshr-org-8024 274 108 ( ( -LRB- blog-dshr-org-8024 274 109 5 5 CD blog-dshr-org-8024 274 110 ) ) -RRB- blog-dshr-org-8024 274 111 ► ► NFP blog-dshr-org-8024 274 112     _SP blog-dshr-org-8024 274 113 January January NNP blog-dshr-org-8024 274 114 ( ( -LRB- blog-dshr-org-8024 274 115 5 5 CD blog-dshr-org-8024 274 116 ) ) -RRB- blog-dshr-org-8024 274 117 ► ► CD blog-dshr-org-8024 274 118     _SP blog-dshr-org-8024 274 119 2019 2019 CD blog-dshr-org-8024 274 120 ( ( -LRB- blog-dshr-org-8024 274 121 66 66 CD blog-dshr-org-8024 274 122 ) ) -RRB- blog-dshr-org-8024 274 123 ► ► NFP blog-dshr-org-8024 274 124     _SP blog-dshr-org-8024 274 125 December December NNP blog-dshr-org-8024 274 126 ( ( -LRB- blog-dshr-org-8024 274 127 2 2 CD blog-dshr-org-8024 274 128 ) ) -RRB- blog-dshr-org-8024 274 129 ► ► NFP blog-dshr-org-8024 274 130     _SP blog-dshr-org-8024 274 131 November November NNP blog-dshr-org-8024 274 132 ( ( -LRB- blog-dshr-org-8024 274 133 4 4 CD blog-dshr-org-8024 274 134 ) ) -RRB- blog-dshr-org-8024 274 135 ► ► NFP blog-dshr-org-8024 274 136     _SP blog-dshr-org-8024 274 137 October October NNP blog-dshr-org-8024 274 138 ( ( -LRB- blog-dshr-org-8024 274 139 8) 8) CD blog-dshr-org-8024 274 140 ► ► CD blog-dshr-org-8024 274 141     _SP blog-dshr-org-8024 274 142 September September NNP blog-dshr-org-8024 274 143 ( ( -LRB- blog-dshr-org-8024 274 144 5 5 CD blog-dshr-org-8024 274 145 ) ) -RRB- blog-dshr-org-8024 274 146 ► ► NFP blog-dshr-org-8024 274 147     _SP blog-dshr-org-8024 274 148 August August NNP blog-dshr-org-8024 274 149 ( ( -LRB- blog-dshr-org-8024 274 150 5 5 CD blog-dshr-org-8024 274 151 ) ) -RRB- blog-dshr-org-8024 274 152 ► ► NFP blog-dshr-org-8024 274 153     _SP blog-dshr-org-8024 274 154 July July NNP blog-dshr-org-8024 274 155 ( ( -LRB- blog-dshr-org-8024 274 156 7 7 CD blog-dshr-org-8024 274 157 ) ) -RRB- blog-dshr-org-8024 274 158 ► ► NFP blog-dshr-org-8024 274 159     _SP blog-dshr-org-8024 274 160 June June NNP blog-dshr-org-8024 274 161 ( ( -LRB- blog-dshr-org-8024 274 162 6 6 CD blog-dshr-org-8024 274 163 ) ) -RRB- blog-dshr-org-8024 274 164 ► ► NFP blog-dshr-org-8024 274 165     _SP blog-dshr-org-8024 274 166 May May NNP blog-dshr-org-8024 274 167 ( ( -LRB- blog-dshr-org-8024 274 168 7 7 CD blog-dshr-org-8024 274 169 ) ) -RRB- blog-dshr-org-8024 274 170 ► ► NFP blog-dshr-org-8024 274 171     _SP blog-dshr-org-8024 274 172 April April NNP blog-dshr-org-8024 274 173 ( ( -LRB- blog-dshr-org-8024 274 174 6 6 CD blog-dshr-org-8024 274 175 ) ) -RRB- blog-dshr-org-8024 274 176 ► ► NFP blog-dshr-org-8024 274 177     _SP blog-dshr-org-8024 274 178 March March NNP blog-dshr-org-8024 274 179 ( ( -LRB- blog-dshr-org-8024 274 180 7 7 CD blog-dshr-org-8024 274 181 ) ) -RRB- blog-dshr-org-8024 274 182 ► ► NFP blog-dshr-org-8024 274 183     _SP blog-dshr-org-8024 274 184 February February NNP blog-dshr-org-8024 274 185 ( ( -LRB- blog-dshr-org-8024 274 186 4 4 CD blog-dshr-org-8024 274 187 ) ) -RRB- blog-dshr-org-8024 274 188 ► ► NFP blog-dshr-org-8024 274 189     _SP blog-dshr-org-8024 274 190 January January NNP blog-dshr-org-8024 274 191 ( ( -LRB- blog-dshr-org-8024 274 192 5 5 CD blog-dshr-org-8024 274 193 ) ) -RRB- blog-dshr-org-8024 274 194 ► ► CD blog-dshr-org-8024 274 195     _SP blog-dshr-org-8024 274 196 2018 2018 CD blog-dshr-org-8024 274 197 ( ( -LRB- blog-dshr-org-8024 274 198 96 96 CD blog-dshr-org-8024 274 199 ) ) -RRB- blog-dshr-org-8024 274 200 ► ► NFP blog-dshr-org-8024 274 201     _SP blog-dshr-org-8024 274 202 December December NNP blog-dshr-org-8024 274 203 ( ( -LRB- blog-dshr-org-8024 274 204 7 7 CD blog-dshr-org-8024 274 205 ) ) -RRB- blog-dshr-org-8024 274 206 ► ► NFP blog-dshr-org-8024 274 207     _SP blog-dshr-org-8024 274 208 November November NNP blog-dshr-org-8024 274 209 ( ( -LRB- blog-dshr-org-8024 274 210 8) 8) CD blog-dshr-org-8024 274 211 ► ► CD blog-dshr-org-8024 274 212     _SP blog-dshr-org-8024 274 213 October October NNP blog-dshr-org-8024 274 214 ( ( -LRB- blog-dshr-org-8024 274 215 10 10 CD blog-dshr-org-8024 274 216 ) ) -RRB- blog-dshr-org-8024 274 217 ► ► NFP blog-dshr-org-8024 274 218     _SP blog-dshr-org-8024 274 219 September September NNP blog-dshr-org-8024 274 220 ( ( -LRB- blog-dshr-org-8024 274 221 5 5 CD blog-dshr-org-8024 274 222 ) ) -RRB- blog-dshr-org-8024 274 223 ► ► NFP blog-dshr-org-8024 274 224     _SP blog-dshr-org-8024 274 225 August August NNP blog-dshr-org-8024 274 226 ( ( -LRB- blog-dshr-org-8024 274 227 8) 8) CD blog-dshr-org-8024 274 228 ► ► CD blog-dshr-org-8024 274 229     _SP blog-dshr-org-8024 274 230 July July NNP blog-dshr-org-8024 274 231 ( ( -LRB- blog-dshr-org-8024 274 232 5 5 CD blog-dshr-org-8024 274 233 ) ) -RRB- blog-dshr-org-8024 274 234 ► ► NFP blog-dshr-org-8024 274 235     _SP blog-dshr-org-8024 274 236 June June NNP blog-dshr-org-8024 274 237 ( ( -LRB- blog-dshr-org-8024 274 238 7 7 CD blog-dshr-org-8024 274 239 ) ) -RRB- blog-dshr-org-8024 274 240 ► ► NFP blog-dshr-org-8024 274 241     _SP blog-dshr-org-8024 274 242 May May NNP blog-dshr-org-8024 274 243 ( ( -LRB- blog-dshr-org-8024 274 244 10 10 CD blog-dshr-org-8024 274 245 ) ) -RRB- blog-dshr-org-8024 274 246 ► ► NFP blog-dshr-org-8024 274 247     _SP blog-dshr-org-8024 274 248 April April NNP blog-dshr-org-8024 274 249 ( ( -LRB- blog-dshr-org-8024 274 250 8) 8) CD blog-dshr-org-8024 274 251 ► ► CD blog-dshr-org-8024 274 252     _SP blog-dshr-org-8024 274 253 March March NNP blog-dshr-org-8024 274 254 ( ( -LRB- blog-dshr-org-8024 274 255 9 9 CD blog-dshr-org-8024 274 256 ) ) -RRB- blog-dshr-org-8024 274 257 ► ► NFP blog-dshr-org-8024 274 258     _SP blog-dshr-org-8024 274 259 February February NNP blog-dshr-org-8024 274 260 ( ( -LRB- blog-dshr-org-8024 274 261 9 9 CD blog-dshr-org-8024 274 262 ) ) -RRB- blog-dshr-org-8024 274 263 ► ► NFP blog-dshr-org-8024 274 264     _SP blog-dshr-org-8024 274 265 January January NNP blog-dshr-org-8024 274 266 ( ( -LRB- blog-dshr-org-8024 274 267 10 10 CD blog-dshr-org-8024 274 268 ) ) -RRB- blog-dshr-org-8024 274 269 ► ► NFP blog-dshr-org-8024 274 270     _SP blog-dshr-org-8024 274 271 2017 2017 CD blog-dshr-org-8024 274 272 ( ( -LRB- blog-dshr-org-8024 274 273 82 82 CD blog-dshr-org-8024 274 274 ) ) -RRB- blog-dshr-org-8024 274 275 ► ► NFP blog-dshr-org-8024 274 276     _SP blog-dshr-org-8024 274 277 December December NNP blog-dshr-org-8024 274 278 ( ( -LRB- blog-dshr-org-8024 274 279 6 6 CD blog-dshr-org-8024 274 280 ) ) -RRB- blog-dshr-org-8024 274 281 ► ► NFP blog-dshr-org-8024 274 282     _SP blog-dshr-org-8024 274 283 November November NNP blog-dshr-org-8024 274 284 ( ( -LRB- blog-dshr-org-8024 274 285 6 6 CD blog-dshr-org-8024 274 286 ) ) -RRB- blog-dshr-org-8024 274 287 ► ► NFP blog-dshr-org-8024 274 288     _SP blog-dshr-org-8024 274 289 October October NNP blog-dshr-org-8024 274 290 ( ( -LRB- blog-dshr-org-8024 274 291 8) 8) CD blog-dshr-org-8024 274 292 ► ► CD blog-dshr-org-8024 274 293     _SP blog-dshr-org-8024 274 294 September September NNP blog-dshr-org-8024 274 295 ( ( -LRB- blog-dshr-org-8024 274 296 6 6 CD blog-dshr-org-8024 274 297 ) ) -RRB- blog-dshr-org-8024 274 298 ► ► NFP blog-dshr-org-8024 274 299     _SP blog-dshr-org-8024 274 300 August August NNP blog-dshr-org-8024 274 301 ( ( -LRB- blog-dshr-org-8024 274 302 7 7 CD blog-dshr-org-8024 274 303 ) ) -RRB- blog-dshr-org-8024 274 304 ► ► NFP blog-dshr-org-8024 274 305     _SP blog-dshr-org-8024 274 306 July July NNP blog-dshr-org-8024 274 307 ( ( -LRB- blog-dshr-org-8024 274 308 5 5 CD blog-dshr-org-8024 274 309 ) ) -RRB- blog-dshr-org-8024 274 310 ► ► NFP blog-dshr-org-8024 274 311     _SP blog-dshr-org-8024 274 312 June June NNP blog-dshr-org-8024 274 313 ( ( -LRB- blog-dshr-org-8024 274 314 7 7 CD blog-dshr-org-8024 274 315 ) ) -RRB- blog-dshr-org-8024 274 316 ► ► NFP blog-dshr-org-8024 274 317     _SP blog-dshr-org-8024 274 318 May May NNP blog-dshr-org-8024 274 319 ( ( -LRB- blog-dshr-org-8024 274 320 6 6 CD blog-dshr-org-8024 274 321 ) ) -RRB- blog-dshr-org-8024 274 322 ► ► NFP blog-dshr-org-8024 274 323     _SP blog-dshr-org-8024 274 324 April April NNP blog-dshr-org-8024 274 325 ( ( -LRB- blog-dshr-org-8024 274 326 7 7 CD blog-dshr-org-8024 274 327 ) ) -RRB- blog-dshr-org-8024 274 328 ► ► NFP blog-dshr-org-8024 274 329     _SP blog-dshr-org-8024 274 330 March March NNP blog-dshr-org-8024 274 331 ( ( -LRB- blog-dshr-org-8024 274 332 11 11 CD blog-dshr-org-8024 274 333 ) ) -RRB- blog-dshr-org-8024 274 334 ► ► NFP blog-dshr-org-8024 274 335     _SP blog-dshr-org-8024 274 336 February February NNP blog-dshr-org-8024 274 337 ( ( -LRB- blog-dshr-org-8024 274 338 5 5 CD blog-dshr-org-8024 274 339 ) ) -RRB- blog-dshr-org-8024 274 340 ► ► NFP blog-dshr-org-8024 274 341     _SP blog-dshr-org-8024 274 342 January January NNP blog-dshr-org-8024 274 343 ( ( -LRB- blog-dshr-org-8024 274 344 8) 8) CD blog-dshr-org-8024 274 345 ► ► CD blog-dshr-org-8024 274 346     _SP blog-dshr-org-8024 274 347 2016 2016 CD blog-dshr-org-8024 274 348 ( ( -LRB- blog-dshr-org-8024 274 349 89 89 CD blog-dshr-org-8024 274 350 ) ) -RRB- blog-dshr-org-8024 274 351 ► ► NFP blog-dshr-org-8024 274 352     _SP blog-dshr-org-8024 274 353 December December NNP blog-dshr-org-8024 274 354 ( ( -LRB- blog-dshr-org-8024 274 355 4 4 CD blog-dshr-org-8024 274 356 ) ) -RRB- blog-dshr-org-8024 274 357 ► ► NFP blog-dshr-org-8024 274 358     _SP blog-dshr-org-8024 274 359 November November NNP blog-dshr-org-8024 274 360 ( ( -LRB- blog-dshr-org-8024 274 361 8) 8) CD blog-dshr-org-8024 274 362 ► ► CD blog-dshr-org-8024 274 363     _SP blog-dshr-org-8024 274 364 October October NNP blog-dshr-org-8024 274 365 ( ( -LRB- blog-dshr-org-8024 274 366 10 10 CD blog-dshr-org-8024 274 367 ) ) -RRB- blog-dshr-org-8024 274 368 ► ► NFP blog-dshr-org-8024 274 369     _SP blog-dshr-org-8024 274 370 September September NNP blog-dshr-org-8024 274 371 ( ( -LRB- blog-dshr-org-8024 274 372 8) 8) CD blog-dshr-org-8024 274 373 ► ► CD blog-dshr-org-8024 274 374     _SP blog-dshr-org-8024 274 375 August August NNP blog-dshr-org-8024 274 376 ( ( -LRB- blog-dshr-org-8024 274 377 8) 8) CD blog-dshr-org-8024 274 378 ► ► CD blog-dshr-org-8024 274 379     _SP blog-dshr-org-8024 274 380 July July NNP blog-dshr-org-8024 274 381 ( ( -LRB- blog-dshr-org-8024 274 382 7 7 CD blog-dshr-org-8024 274 383 ) ) -RRB- blog-dshr-org-8024 274 384 ► ► NFP blog-dshr-org-8024 274 385     _SP blog-dshr-org-8024 274 386 June June NNP blog-dshr-org-8024 274 387 ( ( -LRB- blog-dshr-org-8024 274 388 8) 8) CD blog-dshr-org-8024 274 389 ► ► CD blog-dshr-org-8024 274 390     _SP blog-dshr-org-8024 274 391 May May NNP blog-dshr-org-8024 274 392 ( ( -LRB- blog-dshr-org-8024 274 393 7 7 CD blog-dshr-org-8024 274 394 ) ) -RRB- blog-dshr-org-8024 274 395 ► ► NFP blog-dshr-org-8024 274 396     _SP blog-dshr-org-8024 274 397 April April NNP blog-dshr-org-8024 274 398 ( ( -LRB- blog-dshr-org-8024 274 399 5 5 CD blog-dshr-org-8024 274 400 ) ) -RRB- blog-dshr-org-8024 274 401 ► ► NFP blog-dshr-org-8024 274 402     _SP blog-dshr-org-8024 274 403 March March NNP blog-dshr-org-8024 274 404 ( ( -LRB- blog-dshr-org-8024 274 405 10 10 CD blog-dshr-org-8024 274 406 ) ) -RRB- blog-dshr-org-8024 274 407 ► ► NFP blog-dshr-org-8024 274 408     _SP blog-dshr-org-8024 274 409 February February NNP blog-dshr-org-8024 274 410 ( ( -LRB- blog-dshr-org-8024 274 411 7 7 CD blog-dshr-org-8024 274 412 ) ) -RRB- blog-dshr-org-8024 274 413 ► ► NFP blog-dshr-org-8024 274 414     _SP blog-dshr-org-8024 274 415 January January NNP blog-dshr-org-8024 274 416 ( ( -LRB- blog-dshr-org-8024 274 417 7 7 CD blog-dshr-org-8024 274 418 ) ) -RRB- blog-dshr-org-8024 274 419 ► ► NFP blog-dshr-org-8024 274 420     _SP blog-dshr-org-8024 274 421 2015 2015 CD blog-dshr-org-8024 274 422 ( ( -LRB- blog-dshr-org-8024 274 423 75 75 CD blog-dshr-org-8024 274 424 ) ) -RRB- blog-dshr-org-8024 274 425 ► ► NFP blog-dshr-org-8024 274 426     _SP blog-dshr-org-8024 274 427 December December NNP blog-dshr-org-8024 274 428 ( ( -LRB- blog-dshr-org-8024 274 429 7 7 CD blog-dshr-org-8024 274 430 ) ) -RRB- blog-dshr-org-8024 274 431 ► ► NFP blog-dshr-org-8024 274 432     _SP blog-dshr-org-8024 274 433 November November NNP blog-dshr-org-8024 274 434 ( ( -LRB- blog-dshr-org-8024 274 435 5 5 CD blog-dshr-org-8024 274 436 ) ) -RRB- blog-dshr-org-8024 274 437 ► ► NFP blog-dshr-org-8024 274 438     _SP blog-dshr-org-8024 274 439 October October NNP blog-dshr-org-8024 274 440 ( ( -LRB- blog-dshr-org-8024 274 441 11 11 CD blog-dshr-org-8024 274 442 ) ) -RRB- blog-dshr-org-8024 274 443 ► ► NFP blog-dshr-org-8024 274 444     _SP blog-dshr-org-8024 274 445 September September NNP blog-dshr-org-8024 274 446 ( ( -LRB- blog-dshr-org-8024 274 447 5 5 CD blog-dshr-org-8024 274 448 ) ) -RRB- blog-dshr-org-8024 274 449 ► ► NFP blog-dshr-org-8024 274 450     _SP blog-dshr-org-8024 274 451 August August NNP blog-dshr-org-8024 274 452 ( ( -LRB- blog-dshr-org-8024 274 453 3 3 CD blog-dshr-org-8024 274 454 ) ) -RRB- blog-dshr-org-8024 274 455 ► ► NFP blog-dshr-org-8024 274 456     _SP blog-dshr-org-8024 274 457 July July NNP blog-dshr-org-8024 274 458 ( ( -LRB- blog-dshr-org-8024 274 459 3 3 CD blog-dshr-org-8024 274 460 ) ) -RRB- blog-dshr-org-8024 274 461 ► ► NFP blog-dshr-org-8024 274 462     _SP blog-dshr-org-8024 274 463 June June NNP blog-dshr-org-8024 274 464 ( ( -LRB- blog-dshr-org-8024 274 465 8) 8) CD blog-dshr-org-8024 274 466 ► ► CD blog-dshr-org-8024 274 467     _SP blog-dshr-org-8024 274 468 May May NNP blog-dshr-org-8024 274 469 ( ( -LRB- blog-dshr-org-8024 274 470 10 10 CD blog-dshr-org-8024 274 471 ) ) -RRB- blog-dshr-org-8024 274 472 ► ► NFP blog-dshr-org-8024 274 473     _SP blog-dshr-org-8024 274 474 April April NNP blog-dshr-org-8024 274 475 ( ( -LRB- blog-dshr-org-8024 274 476 6 6 CD blog-dshr-org-8024 274 477 ) ) -RRB- blog-dshr-org-8024 274 478 ► ► NFP blog-dshr-org-8024 274 479     _SP blog-dshr-org-8024 274 480 March March NNP blog-dshr-org-8024 274 481 ( ( -LRB- blog-dshr-org-8024 274 482 6 6 CD blog-dshr-org-8024 274 483 ) ) -RRB- blog-dshr-org-8024 274 484 ► ► NFP blog-dshr-org-8024 274 485     _SP blog-dshr-org-8024 274 486 February February NNP blog-dshr-org-8024 274 487 ( ( -LRB- blog-dshr-org-8024 274 488 7 7 CD blog-dshr-org-8024 274 489 ) ) -RRB- blog-dshr-org-8024 274 490 ► ► NFP blog-dshr-org-8024 274 491     _SP blog-dshr-org-8024 274 492 January January NNP blog-dshr-org-8024 274 493 ( ( -LRB- blog-dshr-org-8024 274 494 4 4 CD blog-dshr-org-8024 274 495 ) ) -RRB- blog-dshr-org-8024 274 496 ► ► CD blog-dshr-org-8024 274 497     _SP blog-dshr-org-8024 274 498 2014 2014 CD blog-dshr-org-8024 274 499 ( ( -LRB- blog-dshr-org-8024 274 500 68 68 CD blog-dshr-org-8024 274 501 ) ) -RRB- blog-dshr-org-8024 274 502 ► ► NFP blog-dshr-org-8024 274 503     _SP blog-dshr-org-8024 274 504 December December NNP blog-dshr-org-8024 274 505 ( ( -LRB- blog-dshr-org-8024 274 506 7 7 CD blog-dshr-org-8024 274 507 ) ) -RRB- blog-dshr-org-8024 274 508 ► ► NFP blog-dshr-org-8024 274 509     _SP blog-dshr-org-8024 274 510 November November NNP blog-dshr-org-8024 274 511 ( ( -LRB- blog-dshr-org-8024 274 512 8) 8) CD blog-dshr-org-8024 274 513 ► ► CD blog-dshr-org-8024 274 514     _SP blog-dshr-org-8024 274 515 October October NNP blog-dshr-org-8024 274 516 ( ( -LRB- blog-dshr-org-8024 274 517 6 6 CD blog-dshr-org-8024 274 518 ) ) -RRB- blog-dshr-org-8024 274 519 ► ► NFP blog-dshr-org-8024 274 520     _SP blog-dshr-org-8024 274 521 September September NNP blog-dshr-org-8024 274 522 ( ( -LRB- blog-dshr-org-8024 274 523 8) 8) CD blog-dshr-org-8024 274 524 ► ► CD blog-dshr-org-8024 274 525     _SP blog-dshr-org-8024 274 526 August August NNP blog-dshr-org-8024 274 527 ( ( -LRB- blog-dshr-org-8024 274 528 7 7 CD blog-dshr-org-8024 274 529 ) ) -RRB- blog-dshr-org-8024 274 530 ► ► NFP blog-dshr-org-8024 274 531     _SP blog-dshr-org-8024 274 532 July July NNP blog-dshr-org-8024 274 533 ( ( -LRB- blog-dshr-org-8024 274 534 3 3 CD blog-dshr-org-8024 274 535 ) ) -RRB- blog-dshr-org-8024 274 536 ► ► NFP blog-dshr-org-8024 274 537     _SP blog-dshr-org-8024 274 538 June June NNP blog-dshr-org-8024 274 539 ( ( -LRB- blog-dshr-org-8024 274 540 5 5 CD blog-dshr-org-8024 274 541 ) ) -RRB- blog-dshr-org-8024 274 542 ► ► NFP blog-dshr-org-8024 274 543     _SP blog-dshr-org-8024 274 544 May May NNP blog-dshr-org-8024 274 545 ( ( -LRB- blog-dshr-org-8024 274 546 6 6 CD blog-dshr-org-8024 274 547 ) ) -RRB- blog-dshr-org-8024 274 548 ► ► NFP blog-dshr-org-8024 274 549     _SP blog-dshr-org-8024 274 550 April April NNP blog-dshr-org-8024 274 551 ( ( -LRB- blog-dshr-org-8024 274 552 5 5 CD blog-dshr-org-8024 274 553 ) ) -RRB- blog-dshr-org-8024 274 554 ► ► NFP blog-dshr-org-8024 274 555     _SP blog-dshr-org-8024 274 556 March March NNP blog-dshr-org-8024 274 557 ( ( -LRB- blog-dshr-org-8024 274 558 6 6 CD blog-dshr-org-8024 274 559 ) ) -RRB- blog-dshr-org-8024 274 560 ► ► NFP blog-dshr-org-8024 274 561     _SP blog-dshr-org-8024 274 562 February February NNP blog-dshr-org-8024 274 563 ( ( -LRB- blog-dshr-org-8024 274 564 2 2 CD blog-dshr-org-8024 274 565 ) ) -RRB- blog-dshr-org-8024 274 566 ► ► NFP blog-dshr-org-8024 274 567     _SP blog-dshr-org-8024 274 568 January January NNP blog-dshr-org-8024 274 569 ( ( -LRB- blog-dshr-org-8024 274 570 5 5 CD blog-dshr-org-8024 274 571 ) ) -RRB- blog-dshr-org-8024 274 572 ► ► CD blog-dshr-org-8024 274 573     _SP blog-dshr-org-8024 274 574 2013 2013 CD blog-dshr-org-8024 274 575 ( ( -LRB- blog-dshr-org-8024 274 576 67 67 CD blog-dshr-org-8024 274 577 ) ) -RRB- blog-dshr-org-8024 274 578 ► ► NFP blog-dshr-org-8024 274 579     _SP blog-dshr-org-8024 274 580 December December NNP blog-dshr-org-8024 274 581 ( ( -LRB- blog-dshr-org-8024 274 582 3 3 CD blog-dshr-org-8024 274 583 ) ) -RRB- blog-dshr-org-8024 274 584 ► ► NFP blog-dshr-org-8024 274 585     _SP blog-dshr-org-8024 274 586 November November NNP blog-dshr-org-8024 274 587 ( ( -LRB- blog-dshr-org-8024 274 588 6 6 CD blog-dshr-org-8024 274 589 ) ) -RRB- blog-dshr-org-8024 274 590 ► ► NFP blog-dshr-org-8024 274 591     _SP blog-dshr-org-8024 274 592 October October NNP blog-dshr-org-8024 274 593 ( ( -LRB- blog-dshr-org-8024 274 594 7 7 CD blog-dshr-org-8024 274 595 ) ) -RRB- blog-dshr-org-8024 274 596 ► ► NFP blog-dshr-org-8024 274 597     _SP blog-dshr-org-8024 274 598 September September NNP blog-dshr-org-8024 274 599 ( ( -LRB- blog-dshr-org-8024 274 600 6 6 CD blog-dshr-org-8024 274 601 ) ) -RRB- blog-dshr-org-8024 274 602 ► ► NFP blog-dshr-org-8024 274 603     _SP blog-dshr-org-8024 274 604 August August NNP blog-dshr-org-8024 274 605 ( ( -LRB- blog-dshr-org-8024 274 606 3 3 CD blog-dshr-org-8024 274 607 ) ) -RRB- blog-dshr-org-8024 274 608 ► ► NFP blog-dshr-org-8024 274 609     _SP blog-dshr-org-8024 274 610 July July NNP blog-dshr-org-8024 274 611 ( ( -LRB- blog-dshr-org-8024 274 612 5 5 CD blog-dshr-org-8024 274 613 ) ) -RRB- blog-dshr-org-8024 274 614 ► ► NFP blog-dshr-org-8024 274 615     _SP blog-dshr-org-8024 274 616 June June NNP blog-dshr-org-8024 274 617 ( ( -LRB- blog-dshr-org-8024 274 618 6 6 CD blog-dshr-org-8024 274 619 ) ) -RRB- blog-dshr-org-8024 274 620 ► ► NFP blog-dshr-org-8024 274 621     _SP blog-dshr-org-8024 274 622 May May NNP blog-dshr-org-8024 274 623 ( ( -LRB- blog-dshr-org-8024 274 624 5 5 CD blog-dshr-org-8024 274 625 ) ) -RRB- blog-dshr-org-8024 274 626 ► ► NFP blog-dshr-org-8024 274 627     _SP blog-dshr-org-8024 274 628 April April NNP blog-dshr-org-8024 274 629 ( ( -LRB- blog-dshr-org-8024 274 630 9 9 CD blog-dshr-org-8024 274 631 ) ) -RRB- blog-dshr-org-8024 274 632 ► ► NFP blog-dshr-org-8024 274 633     _SP blog-dshr-org-8024 274 634 March March NNP blog-dshr-org-8024 274 635 ( ( -LRB- blog-dshr-org-8024 274 636 5 5 CD blog-dshr-org-8024 274 637 ) ) -RRB- blog-dshr-org-8024 274 638 ► ► NFP blog-dshr-org-8024 274 639     _SP blog-dshr-org-8024 274 640 February February NNP blog-dshr-org-8024 274 641 ( ( -LRB- blog-dshr-org-8024 274 642 5 5 CD blog-dshr-org-8024 274 643 ) ) -RRB- blog-dshr-org-8024 274 644 ► ► NFP blog-dshr-org-8024 274 645     _SP blog-dshr-org-8024 274 646 January January NNP blog-dshr-org-8024 274 647 ( ( -LRB- blog-dshr-org-8024 274 648 7 7 CD blog-dshr-org-8024 274 649 ) ) -RRB- blog-dshr-org-8024 274 650 ► ► CD blog-dshr-org-8024 274 651     _SP blog-dshr-org-8024 274 652 2012 2012 CD blog-dshr-org-8024 274 653 ( ( -LRB- blog-dshr-org-8024 274 654 43 43 CD blog-dshr-org-8024 274 655 ) ) -RRB- blog-dshr-org-8024 274 656 ► ► NFP blog-dshr-org-8024 274 657     _SP blog-dshr-org-8024 274 658 December December NNP blog-dshr-org-8024 274 659 ( ( -LRB- blog-dshr-org-8024 274 660 4 4 CD blog-dshr-org-8024 274 661 ) ) -RRB- blog-dshr-org-8024 274 662 ► ► NFP blog-dshr-org-8024 274 663     _SP blog-dshr-org-8024 274 664 November November NNP blog-dshr-org-8024 274 665 ( ( -LRB- blog-dshr-org-8024 274 666 4 4 CD blog-dshr-org-8024 274 667 ) ) -RRB- blog-dshr-org-8024 274 668 ► ► NFP blog-dshr-org-8024 274 669     _SP blog-dshr-org-8024 274 670 October October NNP blog-dshr-org-8024 274 671 ( ( -LRB- blog-dshr-org-8024 274 672 6 6 CD blog-dshr-org-8024 274 673 ) ) -RRB- blog-dshr-org-8024 274 674 ► ► NFP blog-dshr-org-8024 274 675     _SP blog-dshr-org-8024 274 676 September September NNP blog-dshr-org-8024 274 677 ( ( -LRB- blog-dshr-org-8024 274 678 6 6 CD blog-dshr-org-8024 274 679 ) ) -RRB- blog-dshr-org-8024 274 680 ► ► NFP blog-dshr-org-8024 274 681     _SP blog-dshr-org-8024 274 682 August August NNP blog-dshr-org-8024 274 683 ( ( -LRB- blog-dshr-org-8024 274 684 2 2 CD blog-dshr-org-8024 274 685 ) ) -RRB- blog-dshr-org-8024 274 686 ► ► NFP blog-dshr-org-8024 274 687     _SP blog-dshr-org-8024 274 688 July July NNP blog-dshr-org-8024 274 689 ( ( -LRB- blog-dshr-org-8024 274 690 5 5 CD blog-dshr-org-8024 274 691 ) ) -RRB- blog-dshr-org-8024 274 692 ► ► NFP blog-dshr-org-8024 274 693     _SP blog-dshr-org-8024 274 694 June June NNP blog-dshr-org-8024 274 695 ( ( -LRB- blog-dshr-org-8024 274 696 2 2 CD blog-dshr-org-8024 274 697 ) ) -RRB- blog-dshr-org-8024 274 698 ► ► NFP blog-dshr-org-8024 274 699     _SP blog-dshr-org-8024 274 700 May May NNP blog-dshr-org-8024 274 701 ( ( -LRB- blog-dshr-org-8024 274 702 5 5 CD blog-dshr-org-8024 274 703 ) ) -RRB- blog-dshr-org-8024 274 704 ► ► NFP blog-dshr-org-8024 274 705     _SP blog-dshr-org-8024 274 706 March March NNP blog-dshr-org-8024 274 707 ( ( -LRB- blog-dshr-org-8024 274 708 1 1 CD blog-dshr-org-8024 274 709 ) ) -RRB- blog-dshr-org-8024 274 710 ► ► NFP blog-dshr-org-8024 274 711     _SP blog-dshr-org-8024 274 712 February February NNP blog-dshr-org-8024 274 713 ( ( -LRB- blog-dshr-org-8024 274 714 5 5 CD blog-dshr-org-8024 274 715 ) ) -RRB- blog-dshr-org-8024 274 716 ► ► NFP blog-dshr-org-8024 274 717     _SP blog-dshr-org-8024 274 718 January January NNP blog-dshr-org-8024 274 719 ( ( -LRB- blog-dshr-org-8024 274 720 3 3 CD blog-dshr-org-8024 274 721 ) ) -RRB- blog-dshr-org-8024 274 722 ► ► CD blog-dshr-org-8024 274 723     _SP blog-dshr-org-8024 274 724 2011 2011 CD blog-dshr-org-8024 274 725 ( ( -LRB- blog-dshr-org-8024 274 726 40 40 CD blog-dshr-org-8024 274 727 ) ) -RRB- blog-dshr-org-8024 274 728 ► ► NFP blog-dshr-org-8024 274 729     _SP blog-dshr-org-8024 274 730 December December NNP blog-dshr-org-8024 274 731 ( ( -LRB- blog-dshr-org-8024 274 732 2 2 CD blog-dshr-org-8024 274 733 ) ) -RRB- blog-dshr-org-8024 274 734 ► ► NFP blog-dshr-org-8024 274 735     _SP blog-dshr-org-8024 274 736 November November NNP blog-dshr-org-8024 274 737 ( ( -LRB- blog-dshr-org-8024 274 738 1 1 CD blog-dshr-org-8024 274 739 ) ) -RRB- blog-dshr-org-8024 274 740 ► ► NFP blog-dshr-org-8024 274 741     _SP blog-dshr-org-8024 274 742 October October NNP blog-dshr-org-8024 274 743 ( ( -LRB- blog-dshr-org-8024 274 744 7 7 CD blog-dshr-org-8024 274 745 ) ) -RRB- blog-dshr-org-8024 274 746 ► ► NFP blog-dshr-org-8024 274 747     _SP blog-dshr-org-8024 274 748 September September NNP blog-dshr-org-8024 274 749 ( ( -LRB- blog-dshr-org-8024 274 750 3 3 CD blog-dshr-org-8024 274 751 ) ) -RRB- blog-dshr-org-8024 274 752 ► ► NFP blog-dshr-org-8024 274 753     _SP blog-dshr-org-8024 274 754 August August NNP blog-dshr-org-8024 274 755 ( ( -LRB- blog-dshr-org-8024 274 756 5 5 CD blog-dshr-org-8024 274 757 ) ) -RRB- blog-dshr-org-8024 274 758 ► ► NFP blog-dshr-org-8024 274 759     _SP blog-dshr-org-8024 274 760 July July NNP blog-dshr-org-8024 274 761 ( ( -LRB- blog-dshr-org-8024 274 762 2 2 CD blog-dshr-org-8024 274 763 ) ) -RRB- blog-dshr-org-8024 274 764 ► ► NFP blog-dshr-org-8024 274 765     _SP blog-dshr-org-8024 274 766 June June NNP blog-dshr-org-8024 274 767 ( ( -LRB- blog-dshr-org-8024 274 768 2 2 CD blog-dshr-org-8024 274 769 ) ) -RRB- blog-dshr-org-8024 274 770 ► ► NFP blog-dshr-org-8024 274 771     _SP blog-dshr-org-8024 274 772 May May NNP blog-dshr-org-8024 274 773 ( ( -LRB- blog-dshr-org-8024 274 774 2 2 CD blog-dshr-org-8024 274 775 ) ) -RRB- blog-dshr-org-8024 274 776 ► ► NFP blog-dshr-org-8024 274 777     _SP blog-dshr-org-8024 274 778 April April NNP blog-dshr-org-8024 274 779 ( ( -LRB- blog-dshr-org-8024 274 780 4 4 CD blog-dshr-org-8024 274 781 ) ) -RRB- blog-dshr-org-8024 274 782 ► ► NFP blog-dshr-org-8024 274 783     _SP blog-dshr-org-8024 274 784 March March NNP blog-dshr-org-8024 274 785 ( ( -LRB- blog-dshr-org-8024 274 786 4 4 CD blog-dshr-org-8024 274 787 ) ) -RRB- blog-dshr-org-8024 274 788 ► ► NFP blog-dshr-org-8024 274 789     _SP blog-dshr-org-8024 274 790 February February NNP blog-dshr-org-8024 274 791 ( ( -LRB- blog-dshr-org-8024 274 792 4 4 CD blog-dshr-org-8024 274 793 ) ) -RRB- blog-dshr-org-8024 274 794 ► ► NFP blog-dshr-org-8024 274 795     _SP blog-dshr-org-8024 274 796 January January NNP blog-dshr-org-8024 274 797 ( ( -LRB- blog-dshr-org-8024 274 798 4 4 CD blog-dshr-org-8024 274 799 ) ) -RRB- blog-dshr-org-8024 274 800 ► ► CD blog-dshr-org-8024 274 801     _SP blog-dshr-org-8024 274 802 2010 2010 CD blog-dshr-org-8024 274 803 ( ( -LRB- blog-dshr-org-8024 274 804 17 17 CD blog-dshr-org-8024 274 805 ) ) -RRB- blog-dshr-org-8024 274 806 ► ► NFP blog-dshr-org-8024 274 807     _SP blog-dshr-org-8024 274 808 December December NNP blog-dshr-org-8024 274 809 ( ( -LRB- blog-dshr-org-8024 274 810 5 5 CD blog-dshr-org-8024 274 811 ) ) -RRB- blog-dshr-org-8024 274 812 ► ► NFP blog-dshr-org-8024 274 813     _SP blog-dshr-org-8024 274 814 November November NNP blog-dshr-org-8024 274 815 ( ( -LRB- blog-dshr-org-8024 274 816 3 3 CD blog-dshr-org-8024 274 817 ) ) -RRB- blog-dshr-org-8024 274 818 ► ► NFP blog-dshr-org-8024 274 819     _SP blog-dshr-org-8024 274 820 October October NNP blog-dshr-org-8024 274 821 ( ( -LRB- blog-dshr-org-8024 274 822 4 4 CD blog-dshr-org-8024 274 823 ) ) -RRB- blog-dshr-org-8024 274 824 ► ► NFP blog-dshr-org-8024 274 825     _SP blog-dshr-org-8024 274 826 September September NNP blog-dshr-org-8024 274 827 ( ( -LRB- blog-dshr-org-8024 274 828 2 2 CD blog-dshr-org-8024 274 829 ) ) -RRB- blog-dshr-org-8024 274 830 ► ► NFP blog-dshr-org-8024 274 831     _SP blog-dshr-org-8024 274 832 July July NNP blog-dshr-org-8024 274 833 ( ( -LRB- blog-dshr-org-8024 274 834 1 1 CD blog-dshr-org-8024 274 835 ) ) -RRB- blog-dshr-org-8024 274 836 ► ► NFP blog-dshr-org-8024 274 837     _SP blog-dshr-org-8024 274 838 June June NNP blog-dshr-org-8024 274 839 ( ( -LRB- blog-dshr-org-8024 274 840 1 1 CD blog-dshr-org-8024 274 841 ) ) -RRB- blog-dshr-org-8024 274 842 ► ► NFP blog-dshr-org-8024 274 843     _SP blog-dshr-org-8024 274 844 February February NNP blog-dshr-org-8024 274 845 ( ( -LRB- blog-dshr-org-8024 274 846 1 1 CD blog-dshr-org-8024 274 847 ) ) -RRB- blog-dshr-org-8024 274 848 ► ► NFP blog-dshr-org-8024 274 849     _SP blog-dshr-org-8024 274 850 2009 2009 CD blog-dshr-org-8024 274 851 ( ( -LRB- blog-dshr-org-8024 274 852 8) 8) CD blog-dshr-org-8024 274 853 ► ► CD blog-dshr-org-8024 274 854     _SP blog-dshr-org-8024 274 855 July July NNP blog-dshr-org-8024 274 856 ( ( -LRB- blog-dshr-org-8024 274 857 1 1 CD blog-dshr-org-8024 274 858 ) ) -RRB- blog-dshr-org-8024 274 859 ► ► NFP blog-dshr-org-8024 274 860     _SP blog-dshr-org-8024 274 861 June June NNP blog-dshr-org-8024 274 862 ( ( -LRB- blog-dshr-org-8024 274 863 1 1 CD blog-dshr-org-8024 274 864 ) ) -RRB- blog-dshr-org-8024 274 865 ► ► NFP blog-dshr-org-8024 274 866     _SP blog-dshr-org-8024 274 867 May May NNP blog-dshr-org-8024 274 868 ( ( -LRB- blog-dshr-org-8024 274 869 1 1 CD blog-dshr-org-8024 274 870 ) ) -RRB- blog-dshr-org-8024 274 871 ► ► NFP blog-dshr-org-8024 274 872     _SP blog-dshr-org-8024 274 873 April April NNP blog-dshr-org-8024 274 874 ( ( -LRB- blog-dshr-org-8024 274 875 1 1 CD blog-dshr-org-8024 274 876 ) ) -RRB- blog-dshr-org-8024 274 877 ► ► NFP blog-dshr-org-8024 274 878     _SP blog-dshr-org-8024 274 879 March March NNP blog-dshr-org-8024 274 880 ( ( -LRB- blog-dshr-org-8024 274 881 2 2 CD blog-dshr-org-8024 274 882 ) ) -RRB- blog-dshr-org-8024 274 883 ► ► NFP blog-dshr-org-8024 274 884     _SP blog-dshr-org-8024 274 885 January January NNP blog-dshr-org-8024 274 886 ( ( -LRB- blog-dshr-org-8024 274 887 2 2 CD blog-dshr-org-8024 274 888 ) ) -RRB- blog-dshr-org-8024 274 889 ► ► NFP blog-dshr-org-8024 274 890     _SP blog-dshr-org-8024 274 891 2008 2008 CD blog-dshr-org-8024 274 892 ( ( -LRB- blog-dshr-org-8024 274 893 8) 8) CD blog-dshr-org-8024 274 894 ► ► CD blog-dshr-org-8024 274 895     _SP blog-dshr-org-8024 274 896 December December NNP blog-dshr-org-8024 274 897 ( ( -LRB- blog-dshr-org-8024 274 898 2 2 CD blog-dshr-org-8024 274 899 ) ) -RRB- blog-dshr-org-8024 274 900 ► ► NFP blog-dshr-org-8024 274 901     _SP blog-dshr-org-8024 274 902 March March NNP blog-dshr-org-8024 274 903 ( ( -LRB- blog-dshr-org-8024 274 904 1 1 CD blog-dshr-org-8024 274 905 ) ) -RRB- blog-dshr-org-8024 274 906 ► ► NFP blog-dshr-org-8024 274 907     _SP blog-dshr-org-8024 274 908 January January NNP blog-dshr-org-8024 274 909 ( ( -LRB- blog-dshr-org-8024 274 910 5 5 CD blog-dshr-org-8024 274 911 ) ) -RRB- blog-dshr-org-8024 274 912 ► ► CD blog-dshr-org-8024 274 913     _SP blog-dshr-org-8024 274 914 2007 2007 CD blog-dshr-org-8024 274 915 ( ( -LRB- blog-dshr-org-8024 274 916 14 14 CD blog-dshr-org-8024 274 917 ) ) -RRB- blog-dshr-org-8024 274 918 ► ► NFP blog-dshr-org-8024 274 919     _SP blog-dshr-org-8024 274 920 December December NNP blog-dshr-org-8024 274 921 ( ( -LRB- blog-dshr-org-8024 274 922 1 1 CD blog-dshr-org-8024 274 923 ) ) -RRB- blog-dshr-org-8024 274 924 ► ► NFP blog-dshr-org-8024 274 925     _SP blog-dshr-org-8024 274 926 October October NNP blog-dshr-org-8024 274 927 ( ( -LRB- blog-dshr-org-8024 274 928 3 3 CD blog-dshr-org-8024 274 929 ) ) -RRB- blog-dshr-org-8024 274 930 ► ► NFP blog-dshr-org-8024 274 931     _SP blog-dshr-org-8024 274 932 September September NNP blog-dshr-org-8024 274 933 ( ( -LRB- blog-dshr-org-8024 274 934 1 1 CD blog-dshr-org-8024 274 935 ) ) -RRB- blog-dshr-org-8024 274 936 ► ► NFP blog-dshr-org-8024 274 937     _SP blog-dshr-org-8024 274 938 August August NNP blog-dshr-org-8024 274 939 ( ( -LRB- blog-dshr-org-8024 274 940 1 1 CD blog-dshr-org-8024 274 941 ) ) -RRB- blog-dshr-org-8024 274 942 ► ► NFP blog-dshr-org-8024 274 943     _SP blog-dshr-org-8024 274 944 July July NNP blog-dshr-org-8024 274 945 ( ( -LRB- blog-dshr-org-8024 274 946 2 2 CD blog-dshr-org-8024 274 947 ) ) -RRB- blog-dshr-org-8024 274 948 ► ► NFP blog-dshr-org-8024 274 949     _SP blog-dshr-org-8024 274 950 June June NNP blog-dshr-org-8024 274 951 ( ( -LRB- blog-dshr-org-8024 274 952 3 3 CD blog-dshr-org-8024 274 953 ) ) -RRB- blog-dshr-org-8024 274 954 ► ► NFP blog-dshr-org-8024 274 955     _SP blog-dshr-org-8024 274 956 May May NNP blog-dshr-org-8024 274 957 ( ( -LRB- blog-dshr-org-8024 274 958 1 1 CD blog-dshr-org-8024 274 959 ) ) -RRB- blog-dshr-org-8024 274 960 ► ► NFP blog-dshr-org-8024 274 961     _SP blog-dshr-org-8024 274 962 April April NNP blog-dshr-org-8024 274 963 ( ( -LRB- blog-dshr-org-8024 274 964 2 2 LS blog-dshr-org-8024 274 965 ) ) -RRB- blog-dshr-org-8024 274 966 LOCKSS LOCKSS NNP blog-dshr-org-8024 274 967 system system NN blog-dshr-org-8024 274 968 has have VBZ blog-dshr-org-8024 274 969 permission permission NN blog-dshr-org-8024 274 970 to to TO blog-dshr-org-8024 274 971 collect collect VB blog-dshr-org-8024 274 972 , , , blog-dshr-org-8024 274 973 preserve preserve VB blog-dshr-org-8024 274 974 , , , blog-dshr-org-8024 274 975 and and CC blog-dshr-org-8024 274 976 serve serve VB blog-dshr-org-8024 274 977 this this DT blog-dshr-org-8024 274 978 Archival Archival NNP blog-dshr-org-8024 274 979 Unit Unit NNP blog-dshr-org-8024 274 980 . . . blog-dshr-org-8024 275 1 Simple simple JJ blog-dshr-org-8024 275 2 theme theme NN blog-dshr-org-8024 275 3 . . . blog-dshr-org-8024 276 1 Powered power VBN blog-dshr-org-8024 276 2 by by IN blog-dshr-org-8024 276 3 Blogger Blogger NNP blog-dshr-org-8024 276 4 . . .