id sid tid token lemma pos blog-dshr-org-2470 1 1 DSHR DSHR NNP blog-dshr-org-2470 1 2 's 's POS blog-dshr-org-2470 1 3 Blog blog NN blog-dshr-org-2470 1 4 : : : blog-dshr-org-2470 1 5 Securing secure VBG blog-dshr-org-2470 1 6 The the DT blog-dshr-org-2470 1 7 Software Software NNP blog-dshr-org-2470 1 8 Supply Supply NNP blog-dshr-org-2470 1 9 Chain Chain NNP blog-dshr-org-2470 1 10 DSHR DSHR NNP blog-dshr-org-2470 1 11 's 's POS blog-dshr-org-2470 1 12 Blog Blog NNP blog-dshr-org-2470 1 13 I -PRON- PRP blog-dshr-org-2470 1 14 'm be VBP blog-dshr-org-2470 1 15 David David NNP blog-dshr-org-2470 1 16 Rosenthal Rosenthal NNP blog-dshr-org-2470 1 17 , , , blog-dshr-org-2470 1 18 and and CC blog-dshr-org-2470 1 19 this this DT blog-dshr-org-2470 1 20 is be VBZ blog-dshr-org-2470 1 21 a a DT blog-dshr-org-2470 1 22 place place NN blog-dshr-org-2470 1 23 to to TO blog-dshr-org-2470 1 24 discuss discuss VB blog-dshr-org-2470 1 25 the the DT blog-dshr-org-2470 1 26 work work NN blog-dshr-org-2470 1 27 I -PRON- PRP blog-dshr-org-2470 1 28 'm be VBP blog-dshr-org-2470 1 29 doing do VBG blog-dshr-org-2470 1 30 in in IN blog-dshr-org-2470 1 31 Digital Digital NNP blog-dshr-org-2470 1 32 Preservation Preservation NNP blog-dshr-org-2470 1 33 . . . blog-dshr-org-2470 2 1 Tuesday Tuesday NNP blog-dshr-org-2470 2 2 , , , blog-dshr-org-2470 2 3 December December NNP blog-dshr-org-2470 2 4 18 18 CD blog-dshr-org-2470 2 5 , , , blog-dshr-org-2470 2 6 2018 2018 CD blog-dshr-org-2470 2 7 Securing secure VBG blog-dshr-org-2470 2 8 The the DT blog-dshr-org-2470 2 9 Software Software NNP blog-dshr-org-2470 2 10 Supply supply NN blog-dshr-org-2470 2 11 Chain Chain NNP blog-dshr-org-2470 2 12 This this DT blog-dshr-org-2470 2 13 is be VBZ blog-dshr-org-2470 2 14 the the DT blog-dshr-org-2470 2 15 second second JJ blog-dshr-org-2470 2 16 part part NN blog-dshr-org-2470 2 17 of of IN blog-dshr-org-2470 2 18 a a DT blog-dshr-org-2470 2 19 series series NN blog-dshr-org-2470 2 20 about about IN blog-dshr-org-2470 2 21 trust trust NN blog-dshr-org-2470 2 22 in in IN blog-dshr-org-2470 2 23 digital digital JJ blog-dshr-org-2470 2 24 content content NN blog-dshr-org-2470 2 25 that that WDT blog-dshr-org-2470 2 26 might may MD blog-dshr-org-2470 2 27 be be VB blog-dshr-org-2470 2 28 called call VBN blog-dshr-org-2470 2 29 : : : blog-dshr-org-2470 2 30 Is be VBZ blog-dshr-org-2470 2 31 this this DT blog-dshr-org-2470 2 32 the the DT blog-dshr-org-2470 2 33 real real JJ blog-dshr-org-2470 2 34 life life NN blog-dshr-org-2470 2 35 ? ? . blog-dshr-org-2470 3 1 Is be VBZ blog-dshr-org-2470 3 2 this this DT blog-dshr-org-2470 3 3 just just RB blog-dshr-org-2470 3 4 fantasy fantasy NN blog-dshr-org-2470 3 5 ? ? . blog-dshr-org-2470 4 1 The the DT blog-dshr-org-2470 4 2 first first JJ blog-dshr-org-2470 4 3 part part NN blog-dshr-org-2470 4 4 was be VBD blog-dshr-org-2470 4 5 Certificate Certificate NNP blog-dshr-org-2470 4 6 Transparency Transparency NNP blog-dshr-org-2470 4 7 , , , blog-dshr-org-2470 4 8 about about IN blog-dshr-org-2470 4 9 how how WRB blog-dshr-org-2470 4 10 we -PRON- PRP blog-dshr-org-2470 4 11 know know VBP blog-dshr-org-2470 4 12 we -PRON- PRP blog-dshr-org-2470 4 13 are be VBP blog-dshr-org-2470 4 14 getting get VBG blog-dshr-org-2470 4 15 content content NN blog-dshr-org-2470 4 16 from from IN blog-dshr-org-2470 4 17 the the DT blog-dshr-org-2470 4 18 Web web NN blog-dshr-org-2470 4 19 site site NN blog-dshr-org-2470 4 20 we -PRON- PRP blog-dshr-org-2470 4 21 intended intend VBD blog-dshr-org-2470 4 22 to to IN blog-dshr-org-2470 4 23 . . . blog-dshr-org-2470 5 1 This this DT blog-dshr-org-2470 5 2 part part NN blog-dshr-org-2470 5 3 is be VBZ blog-dshr-org-2470 5 4 about about IN blog-dshr-org-2470 5 5 how how WRB blog-dshr-org-2470 5 6 we -PRON- PRP blog-dshr-org-2470 5 7 know know VBP blog-dshr-org-2470 5 8 we -PRON- PRP blog-dshr-org-2470 5 9 're be VBP blog-dshr-org-2470 5 10 running run VBG blog-dshr-org-2470 5 11 the the DT blog-dshr-org-2470 5 12 software software NN blog-dshr-org-2470 5 13 we -PRON- PRP blog-dshr-org-2470 5 14 intended intend VBD blog-dshr-org-2470 5 15 to to IN blog-dshr-org-2470 5 16 . . . blog-dshr-org-2470 6 1 This this DT blog-dshr-org-2470 6 2 question question NN blog-dshr-org-2470 6 3 , , , blog-dshr-org-2470 6 4 how how WRB blog-dshr-org-2470 6 5 to to TO blog-dshr-org-2470 6 6 defend defend VB blog-dshr-org-2470 6 7 against against IN blog-dshr-org-2470 6 8 software software NN blog-dshr-org-2470 6 9 supply supply NN blog-dshr-org-2470 6 10 chain chain NN blog-dshr-org-2470 6 11 attacks attack NNS blog-dshr-org-2470 6 12 , , , blog-dshr-org-2470 6 13 has have VBZ blog-dshr-org-2470 6 14 been be VBN blog-dshr-org-2470 6 15 in in IN blog-dshr-org-2470 6 16 the the DT blog-dshr-org-2470 6 17 news news NN blog-dshr-org-2470 6 18 recently recently RB blog-dshr-org-2470 6 19 : : : blog-dshr-org-2470 6 20 A a DT blog-dshr-org-2470 6 21 hacker hacker NN blog-dshr-org-2470 6 22 or or CC blog-dshr-org-2470 6 23 hackers hacker NNS blog-dshr-org-2470 6 24 sneaked sneak VBD blog-dshr-org-2470 6 25 a a DT blog-dshr-org-2470 6 26 backdoor backdoor NN blog-dshr-org-2470 6 27 into into IN blog-dshr-org-2470 6 28 a a DT blog-dshr-org-2470 6 29 widely widely RB blog-dshr-org-2470 6 30 used use VBN blog-dshr-org-2470 6 31 open open JJ blog-dshr-org-2470 6 32 source source NN blog-dshr-org-2470 6 33 code code NN blog-dshr-org-2470 6 34 library library NN blog-dshr-org-2470 6 35 with with IN blog-dshr-org-2470 6 36 the the DT blog-dshr-org-2470 6 37 aim aim NN blog-dshr-org-2470 6 38 of of IN blog-dshr-org-2470 6 39 surreptitiously surreptitiously RB blog-dshr-org-2470 6 40 stealing steal VBG blog-dshr-org-2470 6 41 funds fund NNS blog-dshr-org-2470 6 42 stored store VBN blog-dshr-org-2470 6 43 in in IN blog-dshr-org-2470 6 44 bitcoin bitcoin NN blog-dshr-org-2470 6 45 wallets wallet NNS blog-dshr-org-2470 6 46 , , , blog-dshr-org-2470 6 47 software software NN blog-dshr-org-2470 6 48 developers developer NNS blog-dshr-org-2470 6 49 said say VBD blog-dshr-org-2470 6 50 Monday Monday NNP blog-dshr-org-2470 6 51 . . . blog-dshr-org-2470 7 1 The the DT blog-dshr-org-2470 7 2 malicious malicious JJ blog-dshr-org-2470 7 3 code code NN blog-dshr-org-2470 7 4 was be VBD blog-dshr-org-2470 7 5 inserted insert VBN blog-dshr-org-2470 7 6 in in IN blog-dshr-org-2470 7 7 two two CD blog-dshr-org-2470 7 8 stages stage NNS blog-dshr-org-2470 7 9 into into IN blog-dshr-org-2470 7 10 event event NN blog-dshr-org-2470 7 11 - - HYPH blog-dshr-org-2470 7 12 stream stream NN blog-dshr-org-2470 7 13 , , , blog-dshr-org-2470 7 14 a a DT blog-dshr-org-2470 7 15 code code NN blog-dshr-org-2470 7 16 library library NN blog-dshr-org-2470 7 17 with with IN blog-dshr-org-2470 7 18 2 2 CD blog-dshr-org-2470 7 19 million million CD blog-dshr-org-2470 7 20 downloads download NNS blog-dshr-org-2470 7 21 that that WDT blog-dshr-org-2470 7 22 's be VBZ blog-dshr-org-2470 7 23 used use VBN blog-dshr-org-2470 7 24 by by IN blog-dshr-org-2470 7 25 Fortune Fortune NNP blog-dshr-org-2470 7 26 500 500 CD blog-dshr-org-2470 7 27 companies company NNS blog-dshr-org-2470 7 28 and and CC blog-dshr-org-2470 7 29 small small JJ blog-dshr-org-2470 7 30 startups startup NNS blog-dshr-org-2470 7 31 alike alike RB blog-dshr-org-2470 7 32 . . . blog-dshr-org-2470 8 1 In in IN blog-dshr-org-2470 8 2 stage stage NN blog-dshr-org-2470 8 3 one one CD blog-dshr-org-2470 8 4 , , , blog-dshr-org-2470 8 5 version version NN blog-dshr-org-2470 8 6 3.3.6 3.3.6 CD blog-dshr-org-2470 8 7 , , , blog-dshr-org-2470 8 8 published publish VBN blog-dshr-org-2470 8 9 on on IN blog-dshr-org-2470 8 10 September September NNP blog-dshr-org-2470 8 11 8 8 CD blog-dshr-org-2470 8 12 , , , blog-dshr-org-2470 8 13 included include VBD blog-dshr-org-2470 8 14 a a DT blog-dshr-org-2470 8 15 benign benign JJ blog-dshr-org-2470 8 16 module module NN blog-dshr-org-2470 8 17 known know VBN blog-dshr-org-2470 8 18 as as IN blog-dshr-org-2470 8 19 flatmap flatmap NNP blog-dshr-org-2470 8 20 - - HYPH blog-dshr-org-2470 8 21 stream stream NN blog-dshr-org-2470 8 22 . . . blog-dshr-org-2470 9 1 Stage stage NN blog-dshr-org-2470 9 2 two two CD blog-dshr-org-2470 9 3 was be VBD blog-dshr-org-2470 9 4 implemented implement VBN blog-dshr-org-2470 9 5 on on IN blog-dshr-org-2470 9 6 October October NNP blog-dshr-org-2470 9 7 5 5 CD blog-dshr-org-2470 9 8 when when WRB blog-dshr-org-2470 9 9 flatmap flatmap NN blog-dshr-org-2470 9 10 - - HYPH blog-dshr-org-2470 9 11 stream stream NNP blog-dshr-org-2470 9 12 was be VBD blog-dshr-org-2470 9 13 updated update VBN blog-dshr-org-2470 9 14 to to TO blog-dshr-org-2470 9 15 include include VB blog-dshr-org-2470 9 16 malicious malicious JJ blog-dshr-org-2470 9 17 code code NN blog-dshr-org-2470 9 18 that that WDT blog-dshr-org-2470 9 19 attempted attempt VBD blog-dshr-org-2470 9 20 to to TO blog-dshr-org-2470 9 21 steal steal VB blog-dshr-org-2470 9 22 bitcoin bitcoin NN blog-dshr-org-2470 9 23 wallets wallet NNS blog-dshr-org-2470 9 24 and and CC blog-dshr-org-2470 9 25 transfer transfer VB blog-dshr-org-2470 9 26 their -PRON- PRP$ blog-dshr-org-2470 9 27 balances balance NNS blog-dshr-org-2470 9 28 to to IN blog-dshr-org-2470 9 29 a a DT blog-dshr-org-2470 9 30 server server NN blog-dshr-org-2470 9 31 located locate VBN blog-dshr-org-2470 9 32 in in IN blog-dshr-org-2470 9 33 Kuala Kuala NNP blog-dshr-org-2470 9 34 Lumpur Lumpur NNP blog-dshr-org-2470 9 35 . . . blog-dshr-org-2470 10 1 See see VB blog-dshr-org-2470 10 2 also also RB blog-dshr-org-2470 10 3 here here RB blog-dshr-org-2470 10 4 and and CC blog-dshr-org-2470 10 5 here here RB blog-dshr-org-2470 10 6 . . . blog-dshr-org-2470 11 1 The the DT blog-dshr-org-2470 11 2 good good JJ blog-dshr-org-2470 11 3 news news NN blog-dshr-org-2470 11 4 is be VBZ blog-dshr-org-2470 11 5 that that IN blog-dshr-org-2470 11 6 this this DT blog-dshr-org-2470 11 7 was be VBD blog-dshr-org-2470 11 8 a a DT blog-dshr-org-2470 11 9 highly highly RB blog-dshr-org-2470 11 10 specific specific JJ blog-dshr-org-2470 11 11 attack attack NN blog-dshr-org-2470 11 12 against against IN blog-dshr-org-2470 11 13 a a DT blog-dshr-org-2470 11 14 particular particular JJ blog-dshr-org-2470 11 15 kind kind NN blog-dshr-org-2470 11 16 of of IN blog-dshr-org-2470 11 17 cryptocurrency cryptocurrency NN blog-dshr-org-2470 11 18 wallet wallet NN blog-dshr-org-2470 11 19 software software NN blog-dshr-org-2470 11 20 ; ; : blog-dshr-org-2470 11 21 things thing NNS blog-dshr-org-2470 11 22 could could MD blog-dshr-org-2470 11 23 have have VB blog-dshr-org-2470 11 24 been be VBN blog-dshr-org-2470 11 25 much much RB blog-dshr-org-2470 11 26 worse bad JJR blog-dshr-org-2470 11 27 . . . blog-dshr-org-2470 12 1 The the DT blog-dshr-org-2470 12 2 bad bad JJ blog-dshr-org-2470 12 3 news news NN blog-dshr-org-2470 12 4 is be VBZ blog-dshr-org-2470 12 5 that that IN blog-dshr-org-2470 12 6 , , , blog-dshr-org-2470 12 7 however however RB blog-dshr-org-2470 12 8 effective effective JJ blog-dshr-org-2470 12 9 they -PRON- PRP blog-dshr-org-2470 12 10 may may MD blog-dshr-org-2470 12 11 be be VB blog-dshr-org-2470 12 12 against against IN blog-dshr-org-2470 12 13 some some DT blog-dshr-org-2470 12 14 supply supply NN blog-dshr-org-2470 12 15 chain chain NN blog-dshr-org-2470 12 16 attacks attack NNS blog-dshr-org-2470 12 17 , , , blog-dshr-org-2470 12 18 none none NN blog-dshr-org-2470 12 19 of of IN blog-dshr-org-2470 12 20 the the DT blog-dshr-org-2470 12 21 techniques technique NNS blog-dshr-org-2470 12 22 I -PRON- PRP blog-dshr-org-2470 12 23 discuss discuss VBP blog-dshr-org-2470 12 24 below below IN blog-dshr-org-2470 12 25 the the DT blog-dshr-org-2470 12 26 fold fold NN blog-dshr-org-2470 12 27 would would MD blog-dshr-org-2470 12 28 defend defend VB blog-dshr-org-2470 12 29 against against IN blog-dshr-org-2470 12 30 this this DT blog-dshr-org-2470 12 31 particular particular JJ blog-dshr-org-2470 12 32 attack attack NN blog-dshr-org-2470 12 33 . . . blog-dshr-org-2470 13 1 In in IN blog-dshr-org-2470 13 2 an an DT blog-dshr-org-2470 13 3 important important JJ blog-dshr-org-2470 13 4 paper paper NN blog-dshr-org-2470 13 5 entitled entitle VBN blog-dshr-org-2470 13 6 Software Software NNP blog-dshr-org-2470 13 7 Distribution Distribution NNP blog-dshr-org-2470 13 8 Transparency Transparency NNP blog-dshr-org-2470 13 9 and and CC blog-dshr-org-2470 13 10 Auditability Auditability NNP blog-dshr-org-2470 13 11 , , , blog-dshr-org-2470 13 12 Benjamin Benjamin NNP blog-dshr-org-2470 13 13 Hof Hof NNP blog-dshr-org-2470 13 14 and and CC blog-dshr-org-2470 13 15 Georg Georg NNP blog-dshr-org-2470 13 16 Carle Carle NNP blog-dshr-org-2470 13 17 from from IN blog-dshr-org-2470 13 18 TU TU NNP blog-dshr-org-2470 13 19 Munich Munich NNP blog-dshr-org-2470 13 20 use use NN blog-dshr-org-2470 13 21 Debian Debian NNP blog-dshr-org-2470 13 22 's 's POS blog-dshr-org-2470 13 23 Advanced advanced JJ blog-dshr-org-2470 13 24 Package Package NNP blog-dshr-org-2470 13 25 Tool Tool NNP blog-dshr-org-2470 13 26 ( ( -LRB- blog-dshr-org-2470 13 27 APT APT NNP blog-dshr-org-2470 13 28 ) ) -RRB- blog-dshr-org-2470 13 29 as as IN blog-dshr-org-2470 13 30 an an DT blog-dshr-org-2470 13 31 example example NN blog-dshr-org-2470 13 32 of of IN blog-dshr-org-2470 13 33 a a DT blog-dshr-org-2470 13 34 state state NN blog-dshr-org-2470 13 35 - - HYPH blog-dshr-org-2470 13 36 of of IN blog-dshr-org-2470 13 37 - - HYPH blog-dshr-org-2470 13 38 the the DT blog-dshr-org-2470 13 39 - - HYPH blog-dshr-org-2470 13 40 art art NN blog-dshr-org-2470 13 41 software software NN blog-dshr-org-2470 13 42 supply supply NN blog-dshr-org-2470 13 43 chain chain NN blog-dshr-org-2470 13 44 , , , blog-dshr-org-2470 13 45 and and CC blog-dshr-org-2470 13 46 : : : blog-dshr-org-2470 13 47 Describe describe VB blog-dshr-org-2470 13 48 how how WRB blog-dshr-org-2470 13 49 APT apt JJ blog-dshr-org-2470 13 50 works work NNS blog-dshr-org-2470 13 51 to to TO blog-dshr-org-2470 13 52 maintain maintain VB blog-dshr-org-2470 13 53 up up RB blog-dshr-org-2470 13 54 - - HYPH blog-dshr-org-2470 13 55 to to IN blog-dshr-org-2470 13 56 - - HYPH blog-dshr-org-2470 13 57 date date NN blog-dshr-org-2470 13 58 software software NN blog-dshr-org-2470 13 59 on on IN blog-dshr-org-2470 13 60 clients client NNS blog-dshr-org-2470 13 61 by by IN blog-dshr-org-2470 13 62 distributing distribute VBG blog-dshr-org-2470 13 63 signed sign VBN blog-dshr-org-2470 13 64 packages package NNS blog-dshr-org-2470 13 65 . . . blog-dshr-org-2470 14 1 Review review VB blog-dshr-org-2470 14 2 previous previous JJ blog-dshr-org-2470 14 3 efforts effort NNS blog-dshr-org-2470 14 4 to to TO blog-dshr-org-2470 14 5 improve improve VB blog-dshr-org-2470 14 6 the the DT blog-dshr-org-2470 14 7 security security NN blog-dshr-org-2470 14 8 of of IN blog-dshr-org-2470 14 9 this this DT blog-dshr-org-2470 14 10 process process NN blog-dshr-org-2470 14 11 . . . blog-dshr-org-2470 15 1 Propose propose VB blog-dshr-org-2470 15 2 to to TO blog-dshr-org-2470 15 3 enhance enhance VB blog-dshr-org-2470 15 4 APT APT NNP blog-dshr-org-2470 15 5 's 's POS blog-dshr-org-2470 15 6 security security NN blog-dshr-org-2470 15 7 by by IN blog-dshr-org-2470 15 8 layering layer VBG blog-dshr-org-2470 15 9 a a DT blog-dshr-org-2470 15 10 system system NN blog-dshr-org-2470 15 11 similar similar JJ blog-dshr-org-2470 15 12 to to IN blog-dshr-org-2470 15 13 Certificate Certificate NNP blog-dshr-org-2470 15 14 Transparency Transparency NNP blog-dshr-org-2470 15 15 ( ( -LRB- blog-dshr-org-2470 15 16 CT CT NNP blog-dshr-org-2470 15 17 ) ) -RRB- blog-dshr-org-2470 15 18 on on IN blog-dshr-org-2470 15 19 top top NN blog-dshr-org-2470 15 20 . . . blog-dshr-org-2470 16 1 Detail detail VB blog-dshr-org-2470 16 2 the the DT blog-dshr-org-2470 16 3 operation operation NN blog-dshr-org-2470 16 4 of of IN blog-dshr-org-2470 16 5 their -PRON- PRP$ blog-dshr-org-2470 16 6 systems system NNS blog-dshr-org-2470 16 7 ' ' POS blog-dshr-org-2470 16 8 logs log NNS blog-dshr-org-2470 16 9 , , , blog-dshr-org-2470 16 10 auditors auditor NNS blog-dshr-org-2470 16 11 and and CC blog-dshr-org-2470 16 12 monitors monitor NNS blog-dshr-org-2470 16 13 , , , blog-dshr-org-2470 16 14 which which WDT blog-dshr-org-2470 16 15 are be VBP blog-dshr-org-2470 16 16 similar similar JJ blog-dshr-org-2470 16 17 to to IN blog-dshr-org-2470 16 18 CT CT NNP blog-dshr-org-2470 16 19 's 's POS blog-dshr-org-2470 16 20 in in IN blog-dshr-org-2470 16 21 principle principle NN blog-dshr-org-2470 16 22 but but CC blog-dshr-org-2470 16 23 different different JJ blog-dshr-org-2470 16 24 in in IN blog-dshr-org-2470 16 25 detail detail NN blog-dshr-org-2470 16 26 . . . blog-dshr-org-2470 17 1 Describe describe VB blog-dshr-org-2470 17 2 and and CC blog-dshr-org-2470 17 3 measure measure VB blog-dshr-org-2470 17 4 the the DT blog-dshr-org-2470 17 5 performance performance NN blog-dshr-org-2470 17 6 of of IN blog-dshr-org-2470 17 7 an an DT blog-dshr-org-2470 17 8 implementation implementation NN blog-dshr-org-2470 17 9 of of IN blog-dshr-org-2470 17 10 their -PRON- PRP$ blog-dshr-org-2470 17 11 layer layer NN blog-dshr-org-2470 17 12 on on IN blog-dshr-org-2470 17 13 top top NN blog-dshr-org-2470 17 14 of of IN blog-dshr-org-2470 17 15 APT apt NN blog-dshr-org-2470 17 16 using use VBG blog-dshr-org-2470 17 17 the the DT blog-dshr-org-2470 17 18 Trillian trillian JJ blog-dshr-org-2470 17 19 software software NN blog-dshr-org-2470 17 20 underlying underlie VBG blog-dshr-org-2470 17 21 some some DT blog-dshr-org-2470 17 22 CT CT NNP blog-dshr-org-2470 17 23 implementations implementation NNS blog-dshr-org-2470 17 24 . . . blog-dshr-org-2470 18 1 There there EX blog-dshr-org-2470 18 2 are be VBP blog-dshr-org-2470 18 3 two two CD blog-dshr-org-2470 18 4 important important JJ blog-dshr-org-2470 18 5 " " '' blog-dshr-org-2470 18 6 missing miss VBG blog-dshr-org-2470 18 7 pieces piece NNS blog-dshr-org-2470 18 8 " " '' blog-dshr-org-2470 18 9 in in IN blog-dshr-org-2470 18 10 their -PRON- PRP$ blog-dshr-org-2470 18 11 system system NN blog-dshr-org-2470 18 12 , , , blog-dshr-org-2470 18 13 and and CC blog-dshr-org-2470 18 14 all all PDT blog-dshr-org-2470 18 15 the the DT blog-dshr-org-2470 18 16 predecessors predecessor NNS blog-dshr-org-2470 18 17 , , , blog-dshr-org-2470 18 18 which which WDT blog-dshr-org-2470 18 19 are be VBP blog-dshr-org-2470 18 20 the the DT blog-dshr-org-2470 18 21 subjects subject NNS blog-dshr-org-2470 18 22 of of IN blog-dshr-org-2470 18 23 separate separate JJ blog-dshr-org-2470 18 24 efforts effort NNS blog-dshr-org-2470 18 25 : : : blog-dshr-org-2470 18 26 Reproducible Reproducible NNP blog-dshr-org-2470 18 27 Builds Builds NNPS blog-dshr-org-2470 18 28 . . . blog-dshr-org-2470 19 1 Bootstrappable Bootstrappable NNP blog-dshr-org-2470 19 2 Compilers Compilers NNPS blog-dshr-org-2470 19 3 . . . blog-dshr-org-2470 20 1 How how WRB blog-dshr-org-2470 20 2 APT apt JJ blog-dshr-org-2470 20 3 Works work VBZ blog-dshr-org-2470 20 4 A a DT blog-dshr-org-2470 20 5 system system NN blog-dshr-org-2470 20 6 running run VBG blog-dshr-org-2470 20 7 Debian debian JJ blog-dshr-org-2470 20 8 or or CC blog-dshr-org-2470 20 9 other other JJ blog-dshr-org-2470 20 10 APT apt NN blog-dshr-org-2470 20 11 - - HYPH blog-dshr-org-2470 20 12 based base VBN blog-dshr-org-2470 20 13 Linux Linux NNP blog-dshr-org-2470 20 14 distribution distribution NN blog-dshr-org-2470 20 15 runs run VBZ blog-dshr-org-2470 20 16 software software NN blog-dshr-org-2470 20 17 it -PRON- PRP blog-dshr-org-2470 20 18 received receive VBD blog-dshr-org-2470 20 19 in in IN blog-dshr-org-2470 20 20 " " `` blog-dshr-org-2470 20 21 packages package NNS blog-dshr-org-2470 20 22 " " '' blog-dshr-org-2470 20 23 that that WDT blog-dshr-org-2470 20 24 contain contain VBP blog-dshr-org-2470 20 25 the the DT blog-dshr-org-2470 20 26 software software NN blog-dshr-org-2470 20 27 files file NNS blog-dshr-org-2470 20 28 , , , blog-dshr-org-2470 20 29 and and CC blog-dshr-org-2470 20 30 metadata metadata NN blog-dshr-org-2470 20 31 that that WDT blog-dshr-org-2470 20 32 includes include VBZ blog-dshr-org-2470 20 33 dependencies dependency NNS blog-dshr-org-2470 20 34 . . . blog-dshr-org-2470 21 1 Their -PRON- PRP$ blog-dshr-org-2470 21 2 hashes hash NNS blog-dshr-org-2470 21 3 can can MD blog-dshr-org-2470 21 4 be be VB blog-dshr-org-2470 21 5 verified verify VBN blog-dshr-org-2470 21 6 against against IN blog-dshr-org-2470 21 7 those those DT blog-dshr-org-2470 21 8 in in IN blog-dshr-org-2470 21 9 a a DT blog-dshr-org-2470 21 10 release release NN blog-dshr-org-2470 21 11 file file NN blog-dshr-org-2470 21 12 , , , blog-dshr-org-2470 21 13 signed sign VBN blog-dshr-org-2470 21 14 by by IN blog-dshr-org-2470 21 15 the the DT blog-dshr-org-2470 21 16 distribution distribution NN blog-dshr-org-2470 21 17 publisher publisher NN blog-dshr-org-2470 21 18 . . . blog-dshr-org-2470 22 1 Packages package NNS blog-dshr-org-2470 22 2 come come VBP blog-dshr-org-2470 22 3 in in IN blog-dshr-org-2470 22 4 two two CD blog-dshr-org-2470 22 5 forms form NNS blog-dshr-org-2470 22 6 , , , blog-dshr-org-2470 22 7 source source NN blog-dshr-org-2470 22 8 and and CC blog-dshr-org-2470 22 9 compiled compile VBD blog-dshr-org-2470 22 10 . . . blog-dshr-org-2470 23 1 The the DT blog-dshr-org-2470 23 2 source source NN blog-dshr-org-2470 23 3 of of IN blog-dshr-org-2470 23 4 a a DT blog-dshr-org-2470 23 5 package package NN blog-dshr-org-2470 23 6 is be VBZ blog-dshr-org-2470 23 7 signed sign VBN blog-dshr-org-2470 23 8 by by IN blog-dshr-org-2470 23 9 the the DT blog-dshr-org-2470 23 10 official official JJ blog-dshr-org-2470 23 11 package package NN blog-dshr-org-2470 23 12 maintainer maintainer NN blog-dshr-org-2470 23 13 and and CC blog-dshr-org-2470 23 14 submitted submit VBN blog-dshr-org-2470 23 15 to to IN blog-dshr-org-2470 23 16 the the DT blog-dshr-org-2470 23 17 distribution distribution NN blog-dshr-org-2470 23 18 publisher publisher NN blog-dshr-org-2470 23 19 . . . blog-dshr-org-2470 24 1 The the DT blog-dshr-org-2470 24 2 publisher publisher NN blog-dshr-org-2470 24 3 verifies verify VBZ blog-dshr-org-2470 24 4 the the DT blog-dshr-org-2470 24 5 signature signature NN blog-dshr-org-2470 24 6 and and CC blog-dshr-org-2470 24 7 builds build VBZ blog-dshr-org-2470 24 8 the the DT blog-dshr-org-2470 24 9 source source NN blog-dshr-org-2470 24 10 to to TO blog-dshr-org-2470 24 11 form form VB blog-dshr-org-2470 24 12 the the DT blog-dshr-org-2470 24 13 compiled compile VBN blog-dshr-org-2470 24 14 package package NN blog-dshr-org-2470 24 15 , , , blog-dshr-org-2470 24 16 whose whose WP$ blog-dshr-org-2470 24 17 hash hash NN blog-dshr-org-2470 24 18 is be VBZ blog-dshr-org-2470 24 19 then then RB blog-dshr-org-2470 24 20 included include VBN blog-dshr-org-2470 24 21 in in IN blog-dshr-org-2470 24 22 the the DT blog-dshr-org-2470 24 23 release release NN blog-dshr-org-2470 24 24 file file NN blog-dshr-org-2470 24 25 . . . blog-dshr-org-2470 25 1 The the DT blog-dshr-org-2470 25 2 signature signature NN blog-dshr-org-2470 25 3 on on IN blog-dshr-org-2470 25 4 the the DT blog-dshr-org-2470 25 5 source source NN blog-dshr-org-2470 25 6 package package NN blog-dshr-org-2470 25 7 verifies verifie NNS blog-dshr-org-2470 25 8 that that IN blog-dshr-org-2470 25 9 the the DT blog-dshr-org-2470 25 10 package package NN blog-dshr-org-2470 25 11 maintainer maintainer NN blog-dshr-org-2470 25 12 approves approve VBZ blog-dshr-org-2470 25 13 this this DT blog-dshr-org-2470 25 14 combination combination NN blog-dshr-org-2470 25 15 of of IN blog-dshr-org-2470 25 16 files file NNS blog-dshr-org-2470 25 17 for for IN blog-dshr-org-2470 25 18 the the DT blog-dshr-org-2470 25 19 distributor distributor NN blog-dshr-org-2470 25 20 to to TO blog-dshr-org-2470 25 21 build build VB blog-dshr-org-2470 25 22 . . . blog-dshr-org-2470 26 1 The the DT blog-dshr-org-2470 26 2 signature signature NN blog-dshr-org-2470 26 3 on on IN blog-dshr-org-2470 26 4 the the DT blog-dshr-org-2470 26 5 release release NN blog-dshr-org-2470 26 6 file file NN blog-dshr-org-2470 26 7 verifies verifie NNS blog-dshr-org-2470 26 8 that that IN blog-dshr-org-2470 26 9 the the DT blog-dshr-org-2470 26 10 distributor distributor NN blog-dshr-org-2470 26 11 built build VBD blog-dshr-org-2470 26 12 the the DT blog-dshr-org-2470 26 13 corresponding correspond VBG blog-dshr-org-2470 26 14 set set NN blog-dshr-org-2470 26 15 of of IN blog-dshr-org-2470 26 16 packages package NNS blog-dshr-org-2470 26 17 from from IN blog-dshr-org-2470 26 18 approved approve VBN blog-dshr-org-2470 26 19 sources source NNS blog-dshr-org-2470 26 20 and and CC blog-dshr-org-2470 26 21 that that IN blog-dshr-org-2470 26 22 the the DT blog-dshr-org-2470 26 23 combination combination NN blog-dshr-org-2470 26 24 is be VBZ blog-dshr-org-2470 26 25 approved approve VBN blog-dshr-org-2470 26 26 for for IN blog-dshr-org-2470 26 27 users user NNS blog-dshr-org-2470 26 28 to to TO blog-dshr-org-2470 26 29 install install VB blog-dshr-org-2470 26 30 . . . blog-dshr-org-2470 27 1 Previous previous JJ blog-dshr-org-2470 27 2 Work work NN blog-dshr-org-2470 27 3 It -PRON- PRP blog-dshr-org-2470 27 4 is be VBZ blog-dshr-org-2470 27 5 , , , blog-dshr-org-2470 27 6 of of IN blog-dshr-org-2470 27 7 course course NN blog-dshr-org-2470 27 8 , , , blog-dshr-org-2470 27 9 possible possible JJ blog-dshr-org-2470 27 10 for for IN blog-dshr-org-2470 27 11 the the DT blog-dshr-org-2470 27 12 private private JJ blog-dshr-org-2470 27 13 keys key NNS blog-dshr-org-2470 27 14 on on IN blog-dshr-org-2470 27 15 which which WDT blog-dshr-org-2470 27 16 the the DT blog-dshr-org-2470 27 17 maintainer maintainer NN blog-dshr-org-2470 27 18 's 's POS blog-dshr-org-2470 27 19 and and CC blog-dshr-org-2470 27 20 distributor distributor NNP blog-dshr-org-2470 27 21 's 's POS blog-dshr-org-2470 27 22 signatures signature NNS blog-dshr-org-2470 27 23 depend depend VBP blog-dshr-org-2470 27 24 to to TO blog-dshr-org-2470 27 25 be be VB blog-dshr-org-2470 27 26 compromised compromise VBN blog-dshr-org-2470 27 27 : : : blog-dshr-org-2470 27 28 Samuel Samuel NNP blog-dshr-org-2470 27 29 et et NNP blog-dshr-org-2470 27 30 al al NNP blog-dshr-org-2470 27 31 . . . blog-dshr-org-2470 28 1 consider consider VB blog-dshr-org-2470 28 2 compromise compromise NN blog-dshr-org-2470 28 3 of of IN blog-dshr-org-2470 28 4 signing sign VBG blog-dshr-org-2470 28 5 keys key NNS blog-dshr-org-2470 28 6 in in IN blog-dshr-org-2470 28 7 the the DT blog-dshr-org-2470 28 8 design design NN blog-dshr-org-2470 28 9 of of IN blog-dshr-org-2470 28 10 The the DT blog-dshr-org-2470 28 11 Update Update NNP blog-dshr-org-2470 28 12 Framework Framework NNP blog-dshr-org-2470 28 13 ( ( -LRB- blog-dshr-org-2470 28 14 TUF TUF NNP blog-dshr-org-2470 28 15 ) ) -RRB- blog-dshr-org-2470 28 16 , , , blog-dshr-org-2470 28 17 a a DT blog-dshr-org-2470 28 18 secure secure JJ blog-dshr-org-2470 28 19 application application NN blog-dshr-org-2470 28 20 updater updater NN blog-dshr-org-2470 28 21 . . . blog-dshr-org-2470 29 1 To to TO blog-dshr-org-2470 29 2 guard guard VB blog-dshr-org-2470 29 3 against against IN blog-dshr-org-2470 29 4 key key JJ blog-dshr-org-2470 29 5 compromise compromise NN blog-dshr-org-2470 29 6 , , , blog-dshr-org-2470 29 7 TUF TUF NNP blog-dshr-org-2470 29 8 introduces introduce VBZ blog-dshr-org-2470 29 9 a a DT blog-dshr-org-2470 29 10 number number NN blog-dshr-org-2470 29 11 of of IN blog-dshr-org-2470 29 12 different different JJ blog-dshr-org-2470 29 13 roles role NNS blog-dshr-org-2470 29 14 in in IN blog-dshr-org-2470 29 15 the the DT blog-dshr-org-2470 29 16 update update NN blog-dshr-org-2470 29 17 release release NN blog-dshr-org-2470 29 18 process process NN blog-dshr-org-2470 29 19 , , , blog-dshr-org-2470 29 20 each each DT blog-dshr-org-2470 29 21 of of IN blog-dshr-org-2470 29 22 which which WDT blog-dshr-org-2470 29 23 operates operate VBZ blog-dshr-org-2470 29 24 cryptographic cryptographic JJ blog-dshr-org-2470 29 25 signing signing NN blog-dshr-org-2470 29 26 keys key NNS blog-dshr-org-2470 29 27 . . . blog-dshr-org-2470 30 1 The the DT blog-dshr-org-2470 30 2 following follow VBG blog-dshr-org-2470 30 3 three three CD blog-dshr-org-2470 30 4 properties property NNS blog-dshr-org-2470 30 5 are be VBP blog-dshr-org-2470 30 6 protected protect VBN blog-dshr-org-2470 30 7 by by IN blog-dshr-org-2470 30 8 TUF TUF NNP blog-dshr-org-2470 30 9 . . . blog-dshr-org-2470 31 1 The the DT blog-dshr-org-2470 31 2 content content NN blog-dshr-org-2470 31 3 of of IN blog-dshr-org-2470 31 4 updates update NNS blog-dshr-org-2470 31 5 is be VBZ blog-dshr-org-2470 31 6 secured secure VBN blog-dshr-org-2470 31 7 , , , blog-dshr-org-2470 31 8 meaning mean VBG blog-dshr-org-2470 31 9 its -PRON- PRP$ blog-dshr-org-2470 31 10 integrity integrity NN blog-dshr-org-2470 31 11 is be VBZ blog-dshr-org-2470 31 12 preserved preserve VBN blog-dshr-org-2470 31 13 . . . blog-dshr-org-2470 32 1 Securing secure VBG blog-dshr-org-2470 32 2 the the DT blog-dshr-org-2470 32 3 availability availability NN blog-dshr-org-2470 32 4 of of IN blog-dshr-org-2470 32 5 updates update NNS blog-dshr-org-2470 32 6 protects protect NNS blog-dshr-org-2470 32 7 against against IN blog-dshr-org-2470 32 8 freeze freeze NN blog-dshr-org-2470 32 9 attacks attack NNS blog-dshr-org-2470 32 10 , , , blog-dshr-org-2470 32 11 where where WRB blog-dshr-org-2470 32 12 an an DT blog-dshr-org-2470 32 13 outdated outdated JJ blog-dshr-org-2470 32 14 version version NN blog-dshr-org-2470 32 15 with with IN blog-dshr-org-2470 32 16 known know VBN blog-dshr-org-2470 32 17 vulnerabilities vulnerability NNS blog-dshr-org-2470 32 18 is be VBZ blog-dshr-org-2470 32 19 served serve VBN blog-dshr-org-2470 32 20 in in IN blog-dshr-org-2470 32 21 place place NN blog-dshr-org-2470 32 22 of of IN blog-dshr-org-2470 32 23 a a DT blog-dshr-org-2470 32 24 security security NN blog-dshr-org-2470 32 25 update update NN blog-dshr-org-2470 32 26 . . . blog-dshr-org-2470 33 1 The the DT blog-dshr-org-2470 33 2 goal goal NN blog-dshr-org-2470 33 3 of of IN blog-dshr-org-2470 33 4 maintaining maintain VBG blog-dshr-org-2470 33 5 the the DT blog-dshr-org-2470 33 6 correct correct JJ blog-dshr-org-2470 33 7 combination combination NN blog-dshr-org-2470 33 8 of of IN blog-dshr-org-2470 33 9 updates update NNS blog-dshr-org-2470 33 10 implies imply VBZ blog-dshr-org-2470 33 11 the the DT blog-dshr-org-2470 33 12 security security NN blog-dshr-org-2470 33 13 of of IN blog-dshr-org-2470 33 14 meta meta JJ blog-dshr-org-2470 33 15 data datum NNS blog-dshr-org-2470 33 16 . . . blog-dshr-org-2470 34 1 The the DT blog-dshr-org-2470 34 2 goal goal NN blog-dshr-org-2470 34 3 of of IN blog-dshr-org-2470 34 4 introducing introduce VBG blog-dshr-org-2470 34 5 multiple multiple JJ blog-dshr-org-2470 34 6 roles role NNS blog-dshr-org-2470 34 7 each each DT blog-dshr-org-2470 34 8 with with IN blog-dshr-org-2470 34 9 its -PRON- PRP$ blog-dshr-org-2470 34 10 own own JJ blog-dshr-org-2470 34 11 key key NN blog-dshr-org-2470 34 12 is be VBZ blog-dshr-org-2470 34 13 to to TO blog-dshr-org-2470 34 14 limit limit VB blog-dshr-org-2470 34 15 the the DT blog-dshr-org-2470 34 16 damage damage NN blog-dshr-org-2470 34 17 a a DT blog-dshr-org-2470 34 18 single single JJ blog-dshr-org-2470 34 19 compromised compromise VBN blog-dshr-org-2470 34 20 key key NN blog-dshr-org-2470 34 21 can can MD blog-dshr-org-2470 34 22 do do VB blog-dshr-org-2470 34 23 . . . blog-dshr-org-2470 35 1 An an DT blog-dshr-org-2470 35 2 orthogonal orthogonal JJ blog-dshr-org-2470 35 3 approach approach NN blog-dshr-org-2470 35 4 is be VBZ blog-dshr-org-2470 35 5 to to TO blog-dshr-org-2470 35 6 implement implement VB blog-dshr-org-2470 35 7 multiple multiple JJ blog-dshr-org-2470 35 8 keys key NNS blog-dshr-org-2470 35 9 for for IN blog-dshr-org-2470 35 10 each each DT blog-dshr-org-2470 35 11 role role NN blog-dshr-org-2470 35 12 , , , blog-dshr-org-2470 35 13 with with IN blog-dshr-org-2470 35 14 users user NNS blog-dshr-org-2470 35 15 requiring require VBG blog-dshr-org-2470 35 16 a a DT blog-dshr-org-2470 35 17 quorum quorum NN blog-dshr-org-2470 35 18 of of IN blog-dshr-org-2470 35 19 verified verified JJ blog-dshr-org-2470 35 20 signatures signature NNS blog-dshr-org-2470 35 21 before before IN blog-dshr-org-2470 35 22 accepting accept VBG blog-dshr-org-2470 35 23 a a DT blog-dshr-org-2470 35 24 package package NN blog-dshr-org-2470 35 25 : : : blog-dshr-org-2470 35 26 Nikitin Nikitin NNP blog-dshr-org-2470 35 27 et et NNP blog-dshr-org-2470 35 28 al al NNP blog-dshr-org-2470 35 29 . . . blog-dshr-org-2470 36 1 develop develop VB blog-dshr-org-2470 36 2 CHAINIAC CHAINIAC NNP blog-dshr-org-2470 36 3 , , , blog-dshr-org-2470 36 4 a a DT blog-dshr-org-2470 36 5 system system NN blog-dshr-org-2470 36 6 for for IN blog-dshr-org-2470 36 7 software software NN blog-dshr-org-2470 36 8 update update NN blog-dshr-org-2470 36 9 transparency transparency NN blog-dshr-org-2470 36 10 . . . blog-dshr-org-2470 37 1 Software software NN blog-dshr-org-2470 37 2 developers developer NNS blog-dshr-org-2470 37 3 create create VBP blog-dshr-org-2470 37 4 a a DT blog-dshr-org-2470 37 5 Merkle Merkle NNP blog-dshr-org-2470 37 6 tree tree NN blog-dshr-org-2470 37 7 over over IN blog-dshr-org-2470 37 8 a a DT blog-dshr-org-2470 37 9 software software NN blog-dshr-org-2470 37 10 package package NN blog-dshr-org-2470 37 11 and and CC blog-dshr-org-2470 37 12 the the DT blog-dshr-org-2470 37 13 corresponding correspond VBG blog-dshr-org-2470 37 14 binaries binary NNS blog-dshr-org-2470 37 15 . . . blog-dshr-org-2470 38 1 This this DT blog-dshr-org-2470 38 2 tree tree NN blog-dshr-org-2470 38 3 is be VBZ blog-dshr-org-2470 38 4 then then RB blog-dshr-org-2470 38 5 signed sign VBN blog-dshr-org-2470 38 6 by by IN blog-dshr-org-2470 38 7 the the DT blog-dshr-org-2470 38 8 developer developer NN blog-dshr-org-2470 38 9 , , , blog-dshr-org-2470 38 10 constituting constitute VBG blog-dshr-org-2470 38 11 release release NN blog-dshr-org-2470 38 12 approval approval NN blog-dshr-org-2470 38 13 . . . blog-dshr-org-2470 39 1 The the DT blog-dshr-org-2470 39 2 signed sign VBN blog-dshr-org-2470 39 3 trees tree NNS blog-dshr-org-2470 39 4 are be VBP blog-dshr-org-2470 39 5 submitted submit VBN blog-dshr-org-2470 39 6 to to TO blog-dshr-org-2470 39 7 co co VB blog-dshr-org-2470 39 8 - - JJ blog-dshr-org-2470 39 9 signing signing JJ blog-dshr-org-2470 39 10 witness witness NN blog-dshr-org-2470 39 11 servers server NNS blog-dshr-org-2470 39 12 . . . blog-dshr-org-2470 40 1 The the DT blog-dshr-org-2470 40 2 witnesses witness NNS blog-dshr-org-2470 40 3 require require VBP blog-dshr-org-2470 40 4 a a DT blog-dshr-org-2470 40 5 threshold threshold NN blog-dshr-org-2470 40 6 of of IN blog-dshr-org-2470 40 7 valid valid JJ blog-dshr-org-2470 40 8 developer developer NN blog-dshr-org-2470 40 9 signatures signature NNS blog-dshr-org-2470 40 10 to to TO blog-dshr-org-2470 40 11 accept accept VB blog-dshr-org-2470 40 12 a a DT blog-dshr-org-2470 40 13 package package NN blog-dshr-org-2470 40 14 for for IN blog-dshr-org-2470 40 15 release release NN blog-dshr-org-2470 40 16 . . . blog-dshr-org-2470 41 1 Additionally additionally RB blog-dshr-org-2470 41 2 , , , blog-dshr-org-2470 41 3 the the DT blog-dshr-org-2470 41 4 mapping mapping NN blog-dshr-org-2470 41 5 between between IN blog-dshr-org-2470 41 6 source source NN blog-dshr-org-2470 41 7 and and CC blog-dshr-org-2470 41 8 binary binary NN blog-dshr-org-2470 41 9 is be VBZ blog-dshr-org-2470 41 10 verified verify VBN blog-dshr-org-2470 41 11 by by IN blog-dshr-org-2470 41 12 some some DT blog-dshr-org-2470 41 13 of of IN blog-dshr-org-2470 41 14 the the DT blog-dshr-org-2470 41 15 witnesses witness NNS blog-dshr-org-2470 41 16 . . . blog-dshr-org-2470 42 1 If if IN blog-dshr-org-2470 42 2 these these DT blog-dshr-org-2470 42 3 two two CD blog-dshr-org-2470 42 4 checks check NNS blog-dshr-org-2470 42 5 succeed succeed VBP blog-dshr-org-2470 42 6 , , , blog-dshr-org-2470 42 7 the the DT blog-dshr-org-2470 42 8 release release NN blog-dshr-org-2470 42 9 is be VBZ blog-dshr-org-2470 42 10 accepted accept VBN blog-dshr-org-2470 42 11 and and CC blog-dshr-org-2470 42 12 collectively collectively RB blog-dshr-org-2470 42 13 signed sign VBN blog-dshr-org-2470 42 14 by by IN blog-dshr-org-2470 42 15 the the DT blog-dshr-org-2470 42 16 witnesses witness NNS blog-dshr-org-2470 42 17 . . . blog-dshr-org-2470 43 1 The the DT blog-dshr-org-2470 43 2 system system NN blog-dshr-org-2470 43 3 allows allow VBZ blog-dshr-org-2470 43 4 to to TO blog-dshr-org-2470 43 5 rotate rotate VB blog-dshr-org-2470 43 6 developer developer NN blog-dshr-org-2470 43 7 keys key NNS blog-dshr-org-2470 43 8 and and CC blog-dshr-org-2470 43 9 witness witness NN blog-dshr-org-2470 43 10 keys key NNS blog-dshr-org-2470 43 11 , , , blog-dshr-org-2470 43 12 while while IN blog-dshr-org-2470 43 13 the the DT blog-dshr-org-2470 43 14 root root NN blog-dshr-org-2470 43 15 of of IN blog-dshr-org-2470 43 16 trust trust NN blog-dshr-org-2470 43 17 is be VBZ blog-dshr-org-2470 43 18 an an DT blog-dshr-org-2470 43 19 offline offline JJ blog-dshr-org-2470 43 20 key key NN blog-dshr-org-2470 43 21 . . . blog-dshr-org-2470 44 1 It -PRON- PRP blog-dshr-org-2470 44 2 also also RB blog-dshr-org-2470 44 3 functions function VBZ blog-dshr-org-2470 44 4 as as IN blog-dshr-org-2470 44 5 a a DT blog-dshr-org-2470 44 6 timestamping timestamping NN blog-dshr-org-2470 44 7 service service NN blog-dshr-org-2470 44 8 , , , blog-dshr-org-2470 44 9 allowing allow VBG blog-dshr-org-2470 44 10 for for IN blog-dshr-org-2470 44 11 verification verification NN blog-dshr-org-2470 44 12 of of IN blog-dshr-org-2470 44 13 update update NN blog-dshr-org-2470 44 14 timeliness timeliness NN blog-dshr-org-2470 44 15 . . . blog-dshr-org-2470 45 1 CT CT NNP blog-dshr-org-2470 45 2 - - HYPH blog-dshr-org-2470 45 3 like like NNP blog-dshr-org-2470 45 4 Layer Layer NNP blog-dshr-org-2470 45 5 Hof Hof NNP blog-dshr-org-2470 45 6 and and CC blog-dshr-org-2470 45 7 Carle Carle NNP blog-dshr-org-2470 45 8 's 's POS blog-dshr-org-2470 45 9 proposal proposal NN blog-dshr-org-2470 45 10 is be VBZ blog-dshr-org-2470 45 11 to to TO blog-dshr-org-2470 45 12 use use VB blog-dshr-org-2470 45 13 verifiable verifiable JJ blog-dshr-org-2470 45 14 logs log NNS blog-dshr-org-2470 45 15 , , , blog-dshr-org-2470 45 16 similar similar JJ blog-dshr-org-2470 45 17 to to IN blog-dshr-org-2470 45 18 those those DT blog-dshr-org-2470 45 19 in in IN blog-dshr-org-2470 45 20 CT CT NNP blog-dshr-org-2470 45 21 , , , blog-dshr-org-2470 45 22 to to TO blog-dshr-org-2470 45 23 ensure ensure VB blog-dshr-org-2470 45 24 that that IN blog-dshr-org-2470 45 25 malfeasance malfeasance NN blog-dshr-org-2470 45 26 is be VBZ blog-dshr-org-2470 45 27 detectable detectable JJ blog-dshr-org-2470 45 28 . . . blog-dshr-org-2470 46 1 They -PRON- PRP blog-dshr-org-2470 46 2 write write VBP blog-dshr-org-2470 46 3 : : : blog-dshr-org-2470 46 4 Compromise compromise NN blog-dshr-org-2470 46 5 of of IN blog-dshr-org-2470 46 6 components component NNS blog-dshr-org-2470 46 7 and and CC blog-dshr-org-2470 46 8 collusion collusion NN blog-dshr-org-2470 46 9 of of IN blog-dshr-org-2470 46 10 participants participant NNS blog-dshr-org-2470 46 11 must must MD blog-dshr-org-2470 46 12 not not RB blog-dshr-org-2470 46 13 result result VB blog-dshr-org-2470 46 14 in in IN blog-dshr-org-2470 46 15 a a DT blog-dshr-org-2470 46 16 violation violation NN blog-dshr-org-2470 46 17 of of IN blog-dshr-org-2470 46 18 the the DT blog-dshr-org-2470 46 19 following follow VBG blog-dshr-org-2470 46 20 security security NN blog-dshr-org-2470 46 21 goals goal NNS blog-dshr-org-2470 46 22 remaining remain VBG blog-dshr-org-2470 46 23 undetected undetected JJ blog-dshr-org-2470 46 24 . . . blog-dshr-org-2470 47 1 A a DT blog-dshr-org-2470 47 2 goal goal NN blog-dshr-org-2470 47 3 of of IN blog-dshr-org-2470 47 4 our -PRON- PRP$ blog-dshr-org-2470 47 5 system system NN blog-dshr-org-2470 47 6 is be VBZ blog-dshr-org-2470 47 7 to to TO blog-dshr-org-2470 47 8 make make VB blog-dshr-org-2470 47 9 it -PRON- PRP blog-dshr-org-2470 47 10 infeasible infeasible JJ blog-dshr-org-2470 47 11 for for IN blog-dshr-org-2470 47 12 the the DT blog-dshr-org-2470 47 13 attacker attacker NN blog-dshr-org-2470 47 14 to to TO blog-dshr-org-2470 47 15 deliver deliver VB blog-dshr-org-2470 47 16 targeted target VBN blog-dshr-org-2470 47 17 backdoors backdoor NNS blog-dshr-org-2470 47 18 . . . blog-dshr-org-2470 48 1 For for IN blog-dshr-org-2470 48 2 every every DT blog-dshr-org-2470 48 3 binary binary NN blog-dshr-org-2470 48 4 , , , blog-dshr-org-2470 48 5 the the DT blog-dshr-org-2470 48 6 system system NN blog-dshr-org-2470 48 7 can can MD blog-dshr-org-2470 48 8 produce produce VB blog-dshr-org-2470 48 9 the the DT blog-dshr-org-2470 48 10 corresponding corresponding JJ blog-dshr-org-2470 48 11 source source NN blog-dshr-org-2470 48 12 code code NN blog-dshr-org-2470 48 13 and and CC blog-dshr-org-2470 48 14 the the DT blog-dshr-org-2470 48 15 authorizing authorize VBG blog-dshr-org-2470 48 16 maintainer maintainer NN blog-dshr-org-2470 48 17 . . . blog-dshr-org-2470 49 1 Defined define VBN blog-dshr-org-2470 49 2 irregularities irregularity NNS blog-dshr-org-2470 49 3 , , , blog-dshr-org-2470 49 4 such such JJ blog-dshr-org-2470 49 5 as as IN blog-dshr-org-2470 49 6 a a DT blog-dshr-org-2470 49 7 failure failure NN blog-dshr-org-2470 49 8 to to TO blog-dshr-org-2470 49 9 correctly correctly RB blog-dshr-org-2470 49 10 increment increment VB blog-dshr-org-2470 49 11 version version NN blog-dshr-org-2470 49 12 numbers number NNS blog-dshr-org-2470 49 13 , , , blog-dshr-org-2470 49 14 also also RB blog-dshr-org-2470 49 15 can can MD blog-dshr-org-2470 49 16 be be VB blog-dshr-org-2470 49 17 detected detect VBN blog-dshr-org-2470 49 18 by by IN blog-dshr-org-2470 49 19 the the DT blog-dshr-org-2470 49 20 system system NN blog-dshr-org-2470 49 21 . . . blog-dshr-org-2470 50 1 As as IN blog-dshr-org-2470 50 2 I -PRON- PRP blog-dshr-org-2470 50 3 understand understand VBP blog-dshr-org-2470 50 4 it -PRON- PRP blog-dshr-org-2470 50 5 , , , blog-dshr-org-2470 50 6 this this DT blog-dshr-org-2470 50 7 is be VBZ blog-dshr-org-2470 50 8 accurate accurate JJ blog-dshr-org-2470 50 9 but but CC blog-dshr-org-2470 50 10 somewhat somewhat RB blog-dshr-org-2470 50 11 misleading misleading JJ blog-dshr-org-2470 50 12 . . . blog-dshr-org-2470 51 1 Their -PRON- PRP$ blog-dshr-org-2470 51 2 system system NN blog-dshr-org-2470 51 3 adds add VBZ blog-dshr-org-2470 51 4 a a DT blog-dshr-org-2470 51 5 transparency transparency NN blog-dshr-org-2470 51 6 layer layer NN blog-dshr-org-2470 51 7 on on IN blog-dshr-org-2470 51 8 top top NN blog-dshr-org-2470 51 9 of of IN blog-dshr-org-2470 51 10 APT apt NN blog-dshr-org-2470 51 11 : : : blog-dshr-org-2470 51 12 The the DT blog-dshr-org-2470 51 13 APT APT NNP blog-dshr-org-2470 51 14 release release NN blog-dshr-org-2470 51 15 file file NN blog-dshr-org-2470 51 16 identifies identifie NNS blog-dshr-org-2470 51 17 , , , blog-dshr-org-2470 51 18 by by IN blog-dshr-org-2470 51 19 cryptographic cryptographic JJ blog-dshr-org-2470 51 20 hash hash NN blog-dshr-org-2470 51 21 , , , blog-dshr-org-2470 51 22 the the DT blog-dshr-org-2470 51 23 packages package NNS blog-dshr-org-2470 51 24 , , , blog-dshr-org-2470 51 25 sources source NNS blog-dshr-org-2470 51 26 , , , blog-dshr-org-2470 51 27 and and CC blog-dshr-org-2470 51 28 meta meta JJ blog-dshr-org-2470 51 29 data datum NNS blog-dshr-org-2470 51 30 which which WDT blog-dshr-org-2470 51 31 includes include VBZ blog-dshr-org-2470 51 32 dependencies dependency NNS blog-dshr-org-2470 51 33 . . . blog-dshr-org-2470 52 1 This this DT blog-dshr-org-2470 52 2 release release NN blog-dshr-org-2470 52 3 file file NN blog-dshr-org-2470 52 4 , , , blog-dshr-org-2470 52 5 meta meta JJ blog-dshr-org-2470 52 6 data datum NNS blog-dshr-org-2470 52 7 , , , blog-dshr-org-2470 52 8 and and CC blog-dshr-org-2470 52 9 source source NN blog-dshr-org-2470 52 10 packages package NNS blog-dshr-org-2470 52 11 are be VBP blog-dshr-org-2470 52 12 submitted submit VBN blog-dshr-org-2470 52 13 to to IN blog-dshr-org-2470 52 14 a a DT blog-dshr-org-2470 52 15 log log NN blog-dshr-org-2470 52 16 server server NN blog-dshr-org-2470 52 17 operating operate VBG blog-dshr-org-2470 52 18 an an DT blog-dshr-org-2470 52 19 appendonly appendonly JJ blog-dshr-org-2470 52 20 Merkle Merkle NNP blog-dshr-org-2470 52 21 tree tree NN blog-dshr-org-2470 52 22 , , , blog-dshr-org-2470 52 23 as as IN blog-dshr-org-2470 52 24 shown show VBN blog-dshr-org-2470 52 25 in in IN blog-dshr-org-2470 52 26 Figure Figure NNP blog-dshr-org-2470 52 27 2 2 CD blog-dshr-org-2470 52 28 . . . blog-dshr-org-2470 53 1 The the DT blog-dshr-org-2470 53 2 log log NN blog-dshr-org-2470 53 3 adds add VBZ blog-dshr-org-2470 53 4 a a DT blog-dshr-org-2470 53 5 new new JJ blog-dshr-org-2470 53 6 leaf leaf NN blog-dshr-org-2470 53 7 for for IN blog-dshr-org-2470 53 8 each each DT blog-dshr-org-2470 53 9 file file NN blog-dshr-org-2470 53 10 . . . blog-dshr-org-2470 54 1 We -PRON- PRP blog-dshr-org-2470 54 2 assume assume VBP blog-dshr-org-2470 54 3 maintainers maintainer NNS blog-dshr-org-2470 54 4 may may MD blog-dshr-org-2470 54 5 only only RB blog-dshr-org-2470 54 6 upload upload JJ blog-dshr-org-2470 54 7 signed sign VBN blog-dshr-org-2470 54 8 source source NN blog-dshr-org-2470 54 9 packages package NNS blog-dshr-org-2470 54 10 to to IN blog-dshr-org-2470 54 11 the the DT blog-dshr-org-2470 54 12 archive archive NN blog-dshr-org-2470 54 13 , , , blog-dshr-org-2470 54 14 not not RB blog-dshr-org-2470 54 15 binary binary JJ blog-dshr-org-2470 54 16 packages package NNS blog-dshr-org-2470 54 17 . . . blog-dshr-org-2470 55 1 The the DT blog-dshr-org-2470 55 2 archive archive JJ blog-dshr-org-2470 55 3 submits submit VBZ blog-dshr-org-2470 55 4 source source NN blog-dshr-org-2470 55 5 packages package NNS blog-dshr-org-2470 55 6 to to IN blog-dshr-org-2470 55 7 one one CD blog-dshr-org-2470 55 8 or or CC blog-dshr-org-2470 55 9 more more JJR blog-dshr-org-2470 55 10 log log NN blog-dshr-org-2470 55 11 servers server NNS blog-dshr-org-2470 55 12 . . . blog-dshr-org-2470 56 1 We -PRON- PRP blog-dshr-org-2470 56 2 further further RB blog-dshr-org-2470 56 3 assume assume VBP blog-dshr-org-2470 56 4 that that IN blog-dshr-org-2470 56 5 the the DT blog-dshr-org-2470 56 6 buildinfo buildinfo NN blog-dshr-org-2470 56 7 files file NNS blog-dshr-org-2470 56 8 capturing capture VBG blog-dshr-org-2470 56 9 the the DT blog-dshr-org-2470 56 10 build build NN blog-dshr-org-2470 56 11 environment environment NN blog-dshr-org-2470 56 12 are be VBP blog-dshr-org-2470 56 13 signed sign VBN blog-dshr-org-2470 56 14 and and CC blog-dshr-org-2470 56 15 are be VBP blog-dshr-org-2470 56 16 made make VBN blog-dshr-org-2470 56 17 public public JJ blog-dshr-org-2470 56 18 , , , blog-dshr-org-2470 56 19 e.g. e.g. RB blog-dshr-org-2470 57 1 by by IN blog-dshr-org-2470 57 2 them -PRON- PRP blog-dshr-org-2470 57 3 being be VBG blog-dshr-org-2470 57 4 covered cover VBN blog-dshr-org-2470 57 5 by by IN blog-dshr-org-2470 57 6 the the DT blog-dshr-org-2470 57 7 release release NN blog-dshr-org-2470 57 8 file file NN blog-dshr-org-2470 57 9 , , , blog-dshr-org-2470 57 10 together together RB blog-dshr-org-2470 57 11 with with IN blog-dshr-org-2470 57 12 other other JJ blog-dshr-org-2470 57 13 meta meta JJ blog-dshr-org-2470 57 14 data datum NNS blog-dshr-org-2470 57 15 . . . blog-dshr-org-2470 58 1 In in IN blog-dshr-org-2470 58 2 order order NN blog-dshr-org-2470 58 3 to to TO blog-dshr-org-2470 58 4 make make VB blog-dshr-org-2470 58 5 the the DT blog-dshr-org-2470 58 6 maintainers maintainer NNS blog-dshr-org-2470 58 7 uploading upload VBG blog-dshr-org-2470 58 8 a a DT blog-dshr-org-2470 58 9 package package NN blog-dshr-org-2470 58 10 accountable accountable JJ blog-dshr-org-2470 58 11 , , , blog-dshr-org-2470 58 12 a a DT blog-dshr-org-2470 58 13 source source NN blog-dshr-org-2470 58 14 package package NN blog-dshr-org-2470 58 15 containing contain VBG blog-dshr-org-2470 58 16 all all DT blog-dshr-org-2470 58 17 maintainer maintainer NN blog-dshr-org-2470 58 18 keys key NNS blog-dshr-org-2470 58 19 is be VBZ blog-dshr-org-2470 58 20 created create VBN blog-dshr-org-2470 58 21 and and CC blog-dshr-org-2470 58 22 submitted submit VBN blog-dshr-org-2470 58 23 into into IN blog-dshr-org-2470 58 24 the the DT blog-dshr-org-2470 58 25 archive archive NN blog-dshr-org-2470 58 26 . . . blog-dshr-org-2470 59 1 This this DT blog-dshr-org-2470 59 2 constitutes constitute VBZ blog-dshr-org-2470 59 3 the the DT blog-dshr-org-2470 59 4 declaration declaration NN blog-dshr-org-2470 59 5 by by IN blog-dshr-org-2470 59 6 the the DT blog-dshr-org-2470 59 7 archive archive NN blog-dshr-org-2470 59 8 , , , blog-dshr-org-2470 59 9 that that IN blog-dshr-org-2470 59 10 these these DT blog-dshr-org-2470 59 11 keys key NNS blog-dshr-org-2470 59 12 were be VBD blog-dshr-org-2470 59 13 authorized authorize VBN blog-dshr-org-2470 59 14 to to TO blog-dshr-org-2470 59 15 upload upload VB blog-dshr-org-2470 59 16 for for IN blog-dshr-org-2470 59 17 this this DT blog-dshr-org-2470 59 18 release release NN blog-dshr-org-2470 59 19 . . . blog-dshr-org-2470 60 1 The the DT blog-dshr-org-2470 60 2 key key JJ blog-dshr-org-2470 60 3 ring ring NN blog-dshr-org-2470 60 4 is be VBZ blog-dshr-org-2470 60 5 required require VBN blog-dshr-org-2470 60 6 to to TO blog-dshr-org-2470 60 7 be be VB blog-dshr-org-2470 60 8 append append NN blog-dshr-org-2470 60 9 - - HYPH blog-dshr-org-2470 60 10 only only RB blog-dshr-org-2470 60 11 , , , blog-dshr-org-2470 60 12 where where WRB blog-dshr-org-2470 60 13 keys key NNS blog-dshr-org-2470 60 14 are be VBP blog-dshr-org-2470 60 15 marked mark VBN blog-dshr-org-2470 60 16 with with IN blog-dshr-org-2470 60 17 an an DT blog-dshr-org-2470 60 18 expiry expiry NN blog-dshr-org-2470 60 19 date date NN blog-dshr-org-2470 60 20 instead instead RB blog-dshr-org-2470 60 21 of of IN blog-dshr-org-2470 60 22 being be VBG blog-dshr-org-2470 60 23 removed remove VBN blog-dshr-org-2470 60 24 . . . blog-dshr-org-2470 61 1 This this DT blog-dshr-org-2470 61 2 allows allow VBZ blog-dshr-org-2470 61 3 verification verification NN blog-dshr-org-2470 61 4 of of IN blog-dshr-org-2470 61 5 source source NN blog-dshr-org-2470 61 6 packages package NNS blog-dshr-org-2470 61 7 submitted submit VBN blog-dshr-org-2470 61 8 long long RB blog-dshr-org-2470 61 9 ago ago RB blog-dshr-org-2470 61 10 , , , blog-dshr-org-2470 61 11 using use VBG blog-dshr-org-2470 61 12 the the DT blog-dshr-org-2470 61 13 keys key NNS blog-dshr-org-2470 61 14 valid valid JJ blog-dshr-org-2470 61 15 at at IN blog-dshr-org-2470 61 16 the the DT blog-dshr-org-2470 61 17 respective respective JJ blog-dshr-org-2470 61 18 point point NN blog-dshr-org-2470 61 19 in in IN blog-dshr-org-2470 61 20 time time NN blog-dshr-org-2470 61 21 . . . blog-dshr-org-2470 62 1 Just just RB blog-dshr-org-2470 62 2 as as IN blog-dshr-org-2470 62 3 with with IN blog-dshr-org-2470 62 4 CT CT NNP blog-dshr-org-2470 62 5 , , , blog-dshr-org-2470 62 6 the the DT blog-dshr-org-2470 62 7 log log NN blog-dshr-org-2470 62 8 replies reply VBZ blog-dshr-org-2470 62 9 to to IN blog-dshr-org-2470 62 10 each each DT blog-dshr-org-2470 62 11 valid valid JJ blog-dshr-org-2470 62 12 submission submission NN blog-dshr-org-2470 62 13 with with IN blog-dshr-org-2470 62 14 a a DT blog-dshr-org-2470 62 15 signed sign VBN blog-dshr-org-2470 62 16 commitment commitment NN blog-dshr-org-2470 62 17 , , , blog-dshr-org-2470 62 18 guaranteeing guarantee VBG blog-dshr-org-2470 62 19 that that IN blog-dshr-org-2470 62 20 it -PRON- PRP blog-dshr-org-2470 62 21 will will MD blog-dshr-org-2470 62 22 shortly shortly RB blog-dshr-org-2470 62 23 produce produce VB blog-dshr-org-2470 62 24 the the DT blog-dshr-org-2470 62 25 signed sign VBN blog-dshr-org-2470 62 26 root root NN blog-dshr-org-2470 62 27 of of IN blog-dshr-org-2470 62 28 a a DT blog-dshr-org-2470 62 29 Merkle Merkle NNP blog-dshr-org-2470 62 30 tree tree NN blog-dshr-org-2470 62 31 that that WDT blog-dshr-org-2470 62 32 includes include VBZ blog-dshr-org-2470 62 33 the the DT blog-dshr-org-2470 62 34 submission submission NN blog-dshr-org-2470 62 35 : : : blog-dshr-org-2470 62 36 At at IN blog-dshr-org-2470 62 37 release release NN blog-dshr-org-2470 62 38 time time NN blog-dshr-org-2470 62 39 , , , blog-dshr-org-2470 62 40 meta meta JJ blog-dshr-org-2470 62 41 data datum NNS blog-dshr-org-2470 62 42 and and CC blog-dshr-org-2470 62 43 release release NN blog-dshr-org-2470 62 44 file file NN blog-dshr-org-2470 62 45 are be VBP blog-dshr-org-2470 62 46 submitted submit VBN blog-dshr-org-2470 62 47 into into IN blog-dshr-org-2470 62 48 the the DT blog-dshr-org-2470 62 49 log log NN blog-dshr-org-2470 62 50 as as RB blog-dshr-org-2470 62 51 well well RB blog-dshr-org-2470 62 52 . . . blog-dshr-org-2470 63 1 The the DT blog-dshr-org-2470 63 2 log log NN blog-dshr-org-2470 63 3 server server NN blog-dshr-org-2470 63 4 produces produce VBZ blog-dshr-org-2470 63 5 a a DT blog-dshr-org-2470 63 6 commitment commitment NN blog-dshr-org-2470 63 7 for for IN blog-dshr-org-2470 63 8 each each DT blog-dshr-org-2470 63 9 submission submission NN blog-dshr-org-2470 63 10 , , , blog-dshr-org-2470 63 11 which which WDT blog-dshr-org-2470 63 12 constitutes constitute VBZ blog-dshr-org-2470 63 13 its -PRON- PRP$ blog-dshr-org-2470 63 14 promise promise NN blog-dshr-org-2470 63 15 to to TO blog-dshr-org-2470 63 16 include include VB blog-dshr-org-2470 63 17 the the DT blog-dshr-org-2470 63 18 submitted submitted JJ blog-dshr-org-2470 63 19 item item NN blog-dshr-org-2470 63 20 into into IN blog-dshr-org-2470 63 21 a a DT blog-dshr-org-2470 63 22 future future JJ blog-dshr-org-2470 63 23 version version NN blog-dshr-org-2470 63 24 of of IN blog-dshr-org-2470 63 25 the the DT blog-dshr-org-2470 63 26 tree tree NN blog-dshr-org-2470 63 27 . . . blog-dshr-org-2470 64 1 The the DT blog-dshr-org-2470 64 2 log log NN blog-dshr-org-2470 64 3 only only RB blog-dshr-org-2470 64 4 accepts accept VBZ blog-dshr-org-2470 64 5 authenticated authenticate VBN blog-dshr-org-2470 64 6 submissions submission NNS blog-dshr-org-2470 64 7 from from IN blog-dshr-org-2470 64 8 the the DT blog-dshr-org-2470 64 9 archive archive NN blog-dshr-org-2470 64 10 . . . blog-dshr-org-2470 65 1 The the DT blog-dshr-org-2470 65 2 commitment commitment NN blog-dshr-org-2470 65 3 includes include VBZ blog-dshr-org-2470 65 4 a a DT blog-dshr-org-2470 65 5 timestamp timestamp NN blog-dshr-org-2470 65 6 , , , blog-dshr-org-2470 65 7 hash hash NN blog-dshr-org-2470 65 8 of of IN blog-dshr-org-2470 65 9 the the DT blog-dshr-org-2470 65 10 release release NN blog-dshr-org-2470 65 11 file file NN blog-dshr-org-2470 65 12 , , , blog-dshr-org-2470 65 13 log log NNP blog-dshr-org-2470 65 14 identifier identifier NNP blog-dshr-org-2470 65 15 and and CC blog-dshr-org-2470 65 16 the the DT blog-dshr-org-2470 65 17 log log NN blog-dshr-org-2470 65 18 's 's POS blog-dshr-org-2470 65 19 signature signature NN blog-dshr-org-2470 65 20 over over IN blog-dshr-org-2470 65 21 these these DT blog-dshr-org-2470 65 22 . . . blog-dshr-org-2470 66 1 The the DT blog-dshr-org-2470 66 2 archive archive NN blog-dshr-org-2470 66 3 should should MD blog-dshr-org-2470 66 4 then then RB blog-dshr-org-2470 66 5 verify verify VB blog-dshr-org-2470 66 6 that that IN blog-dshr-org-2470 66 7 the the DT blog-dshr-org-2470 66 8 log log NN blog-dshr-org-2470 66 9 has have VBZ blog-dshr-org-2470 66 10 produced produce VBN blog-dshr-org-2470 66 11 a a DT blog-dshr-org-2470 66 12 signed sign VBN blog-dshr-org-2470 66 13 tree tree NN blog-dshr-org-2470 66 14 root root NN blog-dshr-org-2470 66 15 that that WDT blog-dshr-org-2470 66 16 resolves resolve VBZ blog-dshr-org-2470 66 17 the the DT blog-dshr-org-2470 66 18 commitment commitment NN blog-dshr-org-2470 66 19 . . . blog-dshr-org-2470 67 1 To to TO blog-dshr-org-2470 67 2 complete complete VB blog-dshr-org-2470 67 3 the the DT blog-dshr-org-2470 67 4 release release NN blog-dshr-org-2470 67 5 , , , blog-dshr-org-2470 67 6 the the DT blog-dshr-org-2470 67 7 archive archive NN blog-dshr-org-2470 67 8 publishes publish VBZ blog-dshr-org-2470 67 9 the the DT blog-dshr-org-2470 67 10 commitments commitment NNS blog-dshr-org-2470 67 11 together together RB blog-dshr-org-2470 67 12 with with IN blog-dshr-org-2470 67 13 the the DT blog-dshr-org-2470 67 14 updates update NNS blog-dshr-org-2470 67 15 . . . blog-dshr-org-2470 68 1 Clients client NNS blog-dshr-org-2470 68 2 can can MD blog-dshr-org-2470 68 3 then then RB blog-dshr-org-2470 68 4 proceed proceed VB blog-dshr-org-2470 68 5 with with IN blog-dshr-org-2470 68 6 the the DT blog-dshr-org-2470 68 7 verification verification NN blog-dshr-org-2470 68 8 of of IN blog-dshr-org-2470 68 9 the the DT blog-dshr-org-2470 68 10 release release NN blog-dshr-org-2470 68 11 file file NN blog-dshr-org-2470 68 12 . . . blog-dshr-org-2470 69 1 The the DT blog-dshr-org-2470 69 2 log log NN blog-dshr-org-2470 69 3 regularly regularly RB blog-dshr-org-2470 69 4 produces produce VBZ blog-dshr-org-2470 69 5 signed sign VBN blog-dshr-org-2470 69 6 Merkle Merkle NNP blog-dshr-org-2470 69 7 tree tree NN blog-dshr-org-2470 69 8 roots root NNS blog-dshr-org-2470 69 9 after after IN blog-dshr-org-2470 69 10 receiving receive VBG blog-dshr-org-2470 69 11 a a DT blog-dshr-org-2470 69 12 valid valid JJ blog-dshr-org-2470 69 13 inclusion inclusion NN blog-dshr-org-2470 69 14 request request NN blog-dshr-org-2470 69 15 . . . blog-dshr-org-2470 70 1 The the DT blog-dshr-org-2470 70 2 signed sign VBN blog-dshr-org-2470 70 3 tree tree NN blog-dshr-org-2470 70 4 root root NN blog-dshr-org-2470 70 5 produced produce VBN blog-dshr-org-2470 70 6 by by IN blog-dshr-org-2470 70 7 the the DT blog-dshr-org-2470 70 8 log log NN blog-dshr-org-2470 70 9 includes include VBZ blog-dshr-org-2470 70 10 the the DT blog-dshr-org-2470 70 11 Merkle Merkle NNP blog-dshr-org-2470 70 12 tree tree NN blog-dshr-org-2470 70 13 hash hash NN blog-dshr-org-2470 70 14 , , , blog-dshr-org-2470 70 15 tree tree NN blog-dshr-org-2470 70 16 size size NN blog-dshr-org-2470 70 17 , , , blog-dshr-org-2470 70 18 timestamp timestamp NN blog-dshr-org-2470 70 19 , , , blog-dshr-org-2470 70 20 log log NNP blog-dshr-org-2470 70 21 identifier identifier NNP blog-dshr-org-2470 70 22 , , , blog-dshr-org-2470 70 23 and and CC blog-dshr-org-2470 70 24 the the DT blog-dshr-org-2470 70 25 log log NN blog-dshr-org-2470 70 26 's 's POS blog-dshr-org-2470 70 27 signature signature NN blog-dshr-org-2470 70 28 . . . blog-dshr-org-2470 71 1 The the DT blog-dshr-org-2470 71 2 client client NN blog-dshr-org-2470 71 3 now now RB blog-dshr-org-2470 71 4 obtains obtain VBZ blog-dshr-org-2470 71 5 from from IN blog-dshr-org-2470 71 6 the the DT blog-dshr-org-2470 71 7 distribution distribution NN blog-dshr-org-2470 71 8 mirror mirror NN blog-dshr-org-2470 71 9 not not RB blog-dshr-org-2470 71 10 just just RB blog-dshr-org-2470 71 11 the the DT blog-dshr-org-2470 71 12 release release NN blog-dshr-org-2470 71 13 file file NN blog-dshr-org-2470 71 14 , , , blog-dshr-org-2470 71 15 but but CC blog-dshr-org-2470 71 16 also also RB blog-dshr-org-2470 71 17 one one CD blog-dshr-org-2470 71 18 or or CC blog-dshr-org-2470 71 19 more more JJR blog-dshr-org-2470 71 20 inclusion inclusion NN blog-dshr-org-2470 71 21 commitments commitment NNS blog-dshr-org-2470 71 22 showing show VBG blog-dshr-org-2470 71 23 that that IN blog-dshr-org-2470 71 24 the the DT blog-dshr-org-2470 71 25 release release NN blog-dshr-org-2470 71 26 file file NN blog-dshr-org-2470 71 27 has have VBZ blog-dshr-org-2470 71 28 been be VBN blog-dshr-org-2470 71 29 submitted submit VBN blog-dshr-org-2470 71 30 to to IN blog-dshr-org-2470 71 31 one one CD blog-dshr-org-2470 71 32 or or CC blog-dshr-org-2470 71 33 more more JJR blog-dshr-org-2470 71 34 of of IN blog-dshr-org-2470 71 35 the the DT blog-dshr-org-2470 71 36 logs log NNS blog-dshr-org-2470 71 37 trusted trust VBD blog-dshr-org-2470 71 38 both both CC blog-dshr-org-2470 71 39 by by IN blog-dshr-org-2470 71 40 the the DT blog-dshr-org-2470 71 41 distributor distributor NN blog-dshr-org-2470 71 42 and and CC blog-dshr-org-2470 71 43 the the DT blog-dshr-org-2470 71 44 client client NN blog-dshr-org-2470 71 45 : : : blog-dshr-org-2470 71 46 Given give VBN blog-dshr-org-2470 71 47 the the DT blog-dshr-org-2470 71 48 release release NN blog-dshr-org-2470 71 49 file file NN blog-dshr-org-2470 71 50 and and CC blog-dshr-org-2470 71 51 inclusion inclusion NN blog-dshr-org-2470 71 52 commitment commitment NN blog-dshr-org-2470 71 53 , , , blog-dshr-org-2470 71 54 the the DT blog-dshr-org-2470 71 55 client client NN blog-dshr-org-2470 71 56 can can MD blog-dshr-org-2470 71 57 verify verify VB blog-dshr-org-2470 71 58 by by IN blog-dshr-org-2470 71 59 hashing hash VBG blog-dshr-org-2470 71 60 that that IN blog-dshr-org-2470 71 61 the the DT blog-dshr-org-2470 71 62 commitment commitment NN blog-dshr-org-2470 71 63 belongs belong VBZ blog-dshr-org-2470 71 64 to to IN blog-dshr-org-2470 71 65 this this DT blog-dshr-org-2470 71 66 release release NN blog-dshr-org-2470 71 67 file file NN blog-dshr-org-2470 71 68 and and CC blog-dshr-org-2470 71 69 also also RB blog-dshr-org-2470 71 70 verify verify VBP blog-dshr-org-2470 71 71 the the DT blog-dshr-org-2470 71 72 signature signature NN blog-dshr-org-2470 71 73 . . . blog-dshr-org-2470 72 1 The the DT blog-dshr-org-2470 72 2 client client NN blog-dshr-org-2470 72 3 can can MD blog-dshr-org-2470 72 4 now now RB blog-dshr-org-2470 72 5 query query VB blog-dshr-org-2470 72 6 the the DT blog-dshr-org-2470 72 7 log log NN blog-dshr-org-2470 72 8 , , , blog-dshr-org-2470 72 9 demanding demand VBG blog-dshr-org-2470 72 10 a a DT blog-dshr-org-2470 72 11 current current JJ blog-dshr-org-2470 72 12 tree tree NN blog-dshr-org-2470 72 13 root root NN blog-dshr-org-2470 72 14 and and CC blog-dshr-org-2470 72 15 an an DT blog-dshr-org-2470 72 16 inclusion inclusion NN blog-dshr-org-2470 72 17 proof proof NN blog-dshr-org-2470 72 18 for for IN blog-dshr-org-2470 72 19 this this DT blog-dshr-org-2470 72 20 release release NN blog-dshr-org-2470 72 21 file file NN blog-dshr-org-2470 72 22 . . . blog-dshr-org-2470 73 1 Per per IN blog-dshr-org-2470 73 2 standard standard JJ blog-dshr-org-2470 73 3 Merkle Merkle NNP blog-dshr-org-2470 73 4 tree tree NN blog-dshr-org-2470 73 5 proofs proof NNS blog-dshr-org-2470 73 6 , , , blog-dshr-org-2470 73 7 the the DT blog-dshr-org-2470 73 8 inclusion inclusion NN blog-dshr-org-2470 73 9 proof proof NN blog-dshr-org-2470 73 10 consists consist VBZ blog-dshr-org-2470 73 11 of of IN blog-dshr-org-2470 73 12 a a DT blog-dshr-org-2470 73 13 list list NN blog-dshr-org-2470 73 14 of of IN blog-dshr-org-2470 73 15 hashes hash NNS blog-dshr-org-2470 73 16 to to TO blog-dshr-org-2470 73 17 recompute recompute VB blog-dshr-org-2470 73 18 the the DT blog-dshr-org-2470 73 19 received received JJ blog-dshr-org-2470 73 20 root root NN blog-dshr-org-2470 73 21 hash hash NN blog-dshr-org-2470 73 22 . . . blog-dshr-org-2470 74 1 For for IN blog-dshr-org-2470 74 2 the the DT blog-dshr-org-2470 74 3 received received JJ blog-dshr-org-2470 74 4 tree tree NN blog-dshr-org-2470 74 5 root root NN blog-dshr-org-2470 74 6 , , , blog-dshr-org-2470 74 7 a a DT blog-dshr-org-2470 74 8 consistency consistency NN blog-dshr-org-2470 74 9 proof proof NN blog-dshr-org-2470 74 10 is be VBZ blog-dshr-org-2470 74 11 demanded demand VBN blog-dshr-org-2470 74 12 to to IN blog-dshr-org-2470 74 13 a a DT blog-dshr-org-2470 74 14 previous previous JJ blog-dshr-org-2470 74 15 known know VBN blog-dshr-org-2470 74 16 tree tree NN blog-dshr-org-2470 74 17 root root NN blog-dshr-org-2470 74 18 . . . blog-dshr-org-2470 75 1 The the DT blog-dshr-org-2470 75 2 consistency consistency NN blog-dshr-org-2470 75 3 proof proof NN blog-dshr-org-2470 75 4 is be VBZ blog-dshr-org-2470 75 5 again again RB blog-dshr-org-2470 75 6 a a DT blog-dshr-org-2470 75 7 list list NN blog-dshr-org-2470 75 8 of of IN blog-dshr-org-2470 75 9 hashes hash NNS blog-dshr-org-2470 75 10 . . . blog-dshr-org-2470 76 1 For for IN blog-dshr-org-2470 76 2 the the DT blog-dshr-org-2470 76 3 two two CD blog-dshr-org-2470 76 4 given give VBN blog-dshr-org-2470 76 5 tree tree NN blog-dshr-org-2470 76 6 roots root NNS blog-dshr-org-2470 76 7 , , , blog-dshr-org-2470 76 8 it -PRON- PRP blog-dshr-org-2470 76 9 shows show VBZ blog-dshr-org-2470 76 10 that that IN blog-dshr-org-2470 76 11 the the DT blog-dshr-org-2470 76 12 log log NN blog-dshr-org-2470 76 13 only only RB blog-dshr-org-2470 76 14 added add VBD blog-dshr-org-2470 76 15 items item NNS blog-dshr-org-2470 76 16 between between IN blog-dshr-org-2470 76 17 them -PRON- PRP blog-dshr-org-2470 76 18 . . . blog-dshr-org-2470 77 1 Clients client NNS blog-dshr-org-2470 77 2 store store VBP blog-dshr-org-2470 77 3 the the DT blog-dshr-org-2470 77 4 signed sign VBN blog-dshr-org-2470 77 5 tree tree NN blog-dshr-org-2470 77 6 root root NN blog-dshr-org-2470 77 7 for for IN blog-dshr-org-2470 77 8 the the DT blog-dshr-org-2470 77 9 largest large JJS blog-dshr-org-2470 77 10 tree tree NN blog-dshr-org-2470 77 11 they -PRON- PRP blog-dshr-org-2470 77 12 have have VBP blog-dshr-org-2470 77 13 seen see VBN blog-dshr-org-2470 77 14 , , , blog-dshr-org-2470 77 15 to to TO blog-dshr-org-2470 77 16 be be VB blog-dshr-org-2470 77 17 used use VBN blog-dshr-org-2470 77 18 in in IN blog-dshr-org-2470 77 19 any any DT blog-dshr-org-2470 77 20 later later JJ blog-dshr-org-2470 77 21 consistency consistency NN blog-dshr-org-2470 77 22 proofs proof NNS blog-dshr-org-2470 77 23 . . . blog-dshr-org-2470 78 1 Set Set VBN blog-dshr-org-2470 78 2 aside aside RB blog-dshr-org-2470 78 3 split split VBD blog-dshr-org-2470 78 4 view view NN blog-dshr-org-2470 78 5 attacks attack NNS blog-dshr-org-2470 78 6 , , , blog-dshr-org-2470 78 7 which which WDT blog-dshr-org-2470 78 8 will will MD blog-dshr-org-2470 78 9 be be VB blog-dshr-org-2470 78 10 discussed discuss VBN blog-dshr-org-2470 78 11 later later RB blog-dshr-org-2470 78 12 , , , blog-dshr-org-2470 78 13 clients client NNS blog-dshr-org-2470 78 14 verifying verify VBG blog-dshr-org-2470 78 15 the the DT blog-dshr-org-2470 78 16 log log NN blog-dshr-org-2470 78 17 inclusion inclusion NN blog-dshr-org-2470 78 18 of of IN blog-dshr-org-2470 78 19 the the DT blog-dshr-org-2470 78 20 release release NN blog-dshr-org-2470 78 21 file file NN blog-dshr-org-2470 78 22 will will MD blog-dshr-org-2470 78 23 detect detect VB blog-dshr-org-2470 78 24 targeted target VBN blog-dshr-org-2470 78 25 modifications modification NNS blog-dshr-org-2470 78 26 of of IN blog-dshr-org-2470 78 27 the the DT blog-dshr-org-2470 78 28 release release NN blog-dshr-org-2470 78 29 . . . blog-dshr-org-2470 79 1 Like like IN blog-dshr-org-2470 79 2 CT CT NNP blog-dshr-org-2470 79 3 , , , blog-dshr-org-2470 79 4 in in IN blog-dshr-org-2470 79 5 addition addition NN blog-dshr-org-2470 79 6 to to TO blog-dshr-org-2470 79 7 logs logs VB blog-dshr-org-2470 79 8 their -PRON- PRP$ blog-dshr-org-2470 79 9 system system NN blog-dshr-org-2470 79 10 includes include VBZ blog-dshr-org-2470 79 11 auditors auditor NNS blog-dshr-org-2470 79 12 , , , blog-dshr-org-2470 79 13 typically typically RB blog-dshr-org-2470 79 14 integrated integrate VBN blog-dshr-org-2470 79 15 with with IN blog-dshr-org-2470 79 16 clients client NNS blog-dshr-org-2470 79 17 , , , blog-dshr-org-2470 79 18 and and CC blog-dshr-org-2470 79 19 independent independent JJ blog-dshr-org-2470 79 20 monitors monitor NNS blog-dshr-org-2470 79 21 regularly regularly RB blog-dshr-org-2470 79 22 checking check VBG blog-dshr-org-2470 79 23 the the DT blog-dshr-org-2470 79 24 logs log NNS blog-dshr-org-2470 79 25 for for IN blog-dshr-org-2470 79 26 anomalies anomaly NNS blog-dshr-org-2470 79 27 . . . blog-dshr-org-2470 80 1 For for IN blog-dshr-org-2470 80 2 details detail NNS blog-dshr-org-2470 80 3 , , , blog-dshr-org-2470 80 4 you -PRON- PRP blog-dshr-org-2470 80 5 need need VBP blog-dshr-org-2470 80 6 to to TO blog-dshr-org-2470 80 7 read read VB blog-dshr-org-2470 80 8 the the DT blog-dshr-org-2470 80 9 paper paper NN blog-dshr-org-2470 80 10 , , , blog-dshr-org-2470 80 11 but but CC blog-dshr-org-2470 80 12 some some DT blog-dshr-org-2470 80 13 idea idea NN blog-dshr-org-2470 80 14 can can MD blog-dshr-org-2470 80 15 be be VB blog-dshr-org-2470 80 16 gained gain VBN blog-dshr-org-2470 80 17 from from IN blog-dshr-org-2470 80 18 their -PRON- PRP$ blog-dshr-org-2470 80 19 description description NN blog-dshr-org-2470 80 20 of of IN blog-dshr-org-2470 80 21 how how WRB blog-dshr-org-2470 80 22 the the DT blog-dshr-org-2470 80 23 system system NN blog-dshr-org-2470 80 24 detects detect VBZ blog-dshr-org-2470 80 25 two two CD blog-dshr-org-2470 80 26 kinds kind NNS blog-dshr-org-2470 80 27 of of IN blog-dshr-org-2470 80 28 attack attack NN blog-dshr-org-2470 80 29 : : : blog-dshr-org-2470 80 30 The the DT blog-dshr-org-2470 80 31 Hidden Hidden NNP blog-dshr-org-2470 80 32 Version Version NNP blog-dshr-org-2470 80 33 Attack Attack NNP blog-dshr-org-2470 80 34 The the DT blog-dshr-org-2470 80 35 Split Split NNP blog-dshr-org-2470 80 36 View View NNP blog-dshr-org-2470 80 37 Attack Attack NNP blog-dshr-org-2470 80 38 The the DT blog-dshr-org-2470 80 39 Hidden Hidden NNP blog-dshr-org-2470 80 40 Version Version NNP blog-dshr-org-2470 80 41 Attack Attack NNP blog-dshr-org-2470 80 42 Hof Hof NNP blog-dshr-org-2470 80 43 and and CC blog-dshr-org-2470 80 44 Carle Carle NNP blog-dshr-org-2470 80 45 describe describe VBP blog-dshr-org-2470 80 46 this this DT blog-dshr-org-2470 80 47 attack attack NN blog-dshr-org-2470 80 48 thus thus RB blog-dshr-org-2470 80 49 : : : blog-dshr-org-2470 80 50 The the DT blog-dshr-org-2470 80 51 hidden hidden JJ blog-dshr-org-2470 80 52 version version NN blog-dshr-org-2470 80 53 attack attack NN blog-dshr-org-2470 80 54 attempts attempt NNS blog-dshr-org-2470 80 55 to to TO blog-dshr-org-2470 80 56 hide hide VB blog-dshr-org-2470 80 57 a a DT blog-dshr-org-2470 80 58 targeted target VBN blog-dshr-org-2470 80 59 backdoor backdoor NN blog-dshr-org-2470 80 60 by by IN blog-dshr-org-2470 80 61 following follow VBG blog-dshr-org-2470 80 62 correct correct JJ blog-dshr-org-2470 80 63 signing signing NN blog-dshr-org-2470 80 64 and and CC blog-dshr-org-2470 80 65 log log NN blog-dshr-org-2470 80 66 submission submission NN blog-dshr-org-2470 80 67 procedures procedure NNS blog-dshr-org-2470 80 68 . . . blog-dshr-org-2470 81 1 It -PRON- PRP blog-dshr-org-2470 81 2 may may MD blog-dshr-org-2470 81 3 require require VB blog-dshr-org-2470 81 4 collusion collusion NN blog-dshr-org-2470 81 5 by by IN blog-dshr-org-2470 81 6 the the DT blog-dshr-org-2470 81 7 archive archive NN blog-dshr-org-2470 81 8 and and CC blog-dshr-org-2470 81 9 an an DT blog-dshr-org-2470 81 10 authorized authorize VBN blog-dshr-org-2470 81 11 maintainer maintainer NN blog-dshr-org-2470 81 12 . . . blog-dshr-org-2470 82 1 The the DT blog-dshr-org-2470 82 2 attacker attacker NN blog-dshr-org-2470 82 3 prepares prepare NNS blog-dshr-org-2470 82 4 targeted target VBN blog-dshr-org-2470 82 5 malicious malicious JJ blog-dshr-org-2470 82 6 update update NN blog-dshr-org-2470 82 7 to to IN blog-dshr-org-2470 82 8 a a DT blog-dshr-org-2470 82 9 package package NN blog-dshr-org-2470 82 10 , , , blog-dshr-org-2470 82 11 say say VBP blog-dshr-org-2470 82 12 version version NN blog-dshr-org-2470 82 13 v1.2.1 v1.2.1 NNP blog-dshr-org-2470 82 14 , , , blog-dshr-org-2470 82 15 and and CC blog-dshr-org-2470 82 16 a a DT blog-dshr-org-2470 82 17 clean clean JJ blog-dshr-org-2470 82 18 update update NN blog-dshr-org-2470 82 19 v1.3.0 v1.3.0 NNP blog-dshr-org-2470 82 20 . . . blog-dshr-org-2470 83 1 The the DT blog-dshr-org-2470 83 2 archive archive JJ blog-dshr-org-2470 83 3 presents present VBZ blog-dshr-org-2470 83 4 the the DT blog-dshr-org-2470 83 5 malicious malicious JJ blog-dshr-org-2470 83 6 package package NN blog-dshr-org-2470 83 7 only only RB blog-dshr-org-2470 83 8 to to IN blog-dshr-org-2470 83 9 the the DT blog-dshr-org-2470 83 10 victim victim NN blog-dshr-org-2470 83 11 when when WRB blog-dshr-org-2470 83 12 it -PRON- PRP blog-dshr-org-2470 83 13 wishes wish VBZ blog-dshr-org-2470 83 14 to to TO blog-dshr-org-2470 83 15 update update VB blog-dshr-org-2470 83 16 . . . blog-dshr-org-2470 84 1 The the DT blog-dshr-org-2470 84 2 clean clean JJ blog-dshr-org-2470 84 3 version version NN blog-dshr-org-2470 84 4 v.1.3.0 v.1.3.0 NNP blog-dshr-org-2470 84 5 will will MD blog-dshr-org-2470 84 6 be be VB blog-dshr-org-2470 84 7 presented present VBN blog-dshr-org-2470 84 8 to to IN blog-dshr-org-2470 84 9 everybody everybody NN blog-dshr-org-2470 84 10 immediately immediately RB blog-dshr-org-2470 84 11 afterwards afterwards RB blog-dshr-org-2470 84 12 . . . blog-dshr-org-2470 85 1 A a DT blog-dshr-org-2470 85 2 non non JJ blog-dshr-org-2470 85 3 - - JJ blog-dshr-org-2470 85 4 targeted targeted JJ blog-dshr-org-2470 85 5 user user NN blog-dshr-org-2470 85 6 is be VBZ blog-dshr-org-2470 85 7 unlikely unlikely JJ blog-dshr-org-2470 85 8 to to TO blog-dshr-org-2470 85 9 ever ever RB blog-dshr-org-2470 85 10 observe observe VB blog-dshr-org-2470 85 11 the the DT blog-dshr-org-2470 85 12 backdoored backdoore VBN blog-dshr-org-2470 85 13 version version NN blog-dshr-org-2470 85 14 , , , blog-dshr-org-2470 85 15 thereby thereby RB blog-dshr-org-2470 85 16 drawing draw VBG blog-dshr-org-2470 85 17 a a DT blog-dshr-org-2470 85 18 minimal minimal JJ blog-dshr-org-2470 85 19 amount amount NN blog-dshr-org-2470 85 20 of of IN blog-dshr-org-2470 85 21 attention attention NN blog-dshr-org-2470 85 22 to to IN blog-dshr-org-2470 85 23 it -PRON- PRP blog-dshr-org-2470 85 24 . . . blog-dshr-org-2470 86 1 The the DT blog-dshr-org-2470 86 2 attack attack NN blog-dshr-org-2470 86 3 however however RB blog-dshr-org-2470 86 4 leaves leave VBZ blog-dshr-org-2470 86 5 an an DT blog-dshr-org-2470 86 6 audit audit NN blog-dshr-org-2470 86 7 trail trail NN blog-dshr-org-2470 86 8 in in IN blog-dshr-org-2470 86 9 the the DT blog-dshr-org-2470 86 10 log log NN blog-dshr-org-2470 86 11 , , , blog-dshr-org-2470 86 12 so so RB blog-dshr-org-2470 86 13 the the DT blog-dshr-org-2470 86 14 update update NN blog-dshr-org-2470 86 15 itself -PRON- PRP blog-dshr-org-2470 86 16 can can MD blog-dshr-org-2470 86 17 be be VB blog-dshr-org-2470 86 18 detected detect VBN blog-dshr-org-2470 86 19 by by IN blog-dshr-org-2470 86 20 auditing audit VBG blog-dshr-org-2470 86 21 . . . blog-dshr-org-2470 87 1 A a DT blog-dshr-org-2470 87 2 package package NN blog-dshr-org-2470 87 3 maintainer maintainer NN blog-dshr-org-2470 87 4 monitoring monitoring NN blog-dshr-org-2470 87 5 uploads upload NNS blog-dshr-org-2470 87 6 for for IN blog-dshr-org-2470 87 7 their -PRON- PRP$ blog-dshr-org-2470 87 8 packages package NNS blog-dshr-org-2470 87 9 using use VBG blog-dshr-org-2470 87 10 the the DT blog-dshr-org-2470 87 11 log log NN blog-dshr-org-2470 87 12 would would MD blog-dshr-org-2470 87 13 notice notice VB blog-dshr-org-2470 87 14 an an DT blog-dshr-org-2470 87 15 additional additional JJ blog-dshr-org-2470 87 16 version version NN blog-dshr-org-2470 87 17 being be VBG blog-dshr-org-2470 87 18 published publish VBN blog-dshr-org-2470 87 19 . . . blog-dshr-org-2470 88 1 A a DT blog-dshr-org-2470 88 2 malicious malicious JJ blog-dshr-org-2470 88 3 package package NN blog-dshr-org-2470 88 4 maintainer maintainer NN blog-dshr-org-2470 88 5 would would MD blog-dshr-org-2470 88 6 however however RB blog-dshr-org-2470 88 7 not not RB blog-dshr-org-2470 88 8 alert alert VB blog-dshr-org-2470 88 9 the the DT blog-dshr-org-2470 88 10 public public NN blog-dshr-org-2470 88 11 when when WRB blog-dshr-org-2470 88 12 this this DT blog-dshr-org-2470 88 13 happens happen VBZ blog-dshr-org-2470 88 14 . . . blog-dshr-org-2470 89 1 This this DT blog-dshr-org-2470 89 2 could could MD blog-dshr-org-2470 89 3 be be VB blog-dshr-org-2470 89 4 construed construe VBN blog-dshr-org-2470 89 5 as as IN blog-dshr-org-2470 89 6 a a DT blog-dshr-org-2470 89 7 targeted targeted JJ blog-dshr-org-2470 89 8 backdoor backdoor NN blog-dshr-org-2470 89 9 in in IN blog-dshr-org-2470 89 10 violation violation NN blog-dshr-org-2470 89 11 of of IN blog-dshr-org-2470 89 12 the the DT blog-dshr-org-2470 89 13 stated stated JJ blog-dshr-org-2470 89 14 security security NN blog-dshr-org-2470 89 15 goals goal NNS blog-dshr-org-2470 89 16 . . . blog-dshr-org-2470 90 1 It -PRON- PRP blog-dshr-org-2470 90 2 is be VBZ blog-dshr-org-2470 90 3 true true JJ blog-dshr-org-2470 90 4 that that IN blog-dshr-org-2470 90 5 the the DT blog-dshr-org-2470 90 6 backdoored backdoore VBN blog-dshr-org-2470 90 7 package package NN blog-dshr-org-2470 90 8 would would MD blog-dshr-org-2470 90 9 be be VB blog-dshr-org-2470 90 10 in in IN blog-dshr-org-2470 90 11 the the DT blog-dshr-org-2470 90 12 logs log NNS blog-dshr-org-2470 90 13 , , , blog-dshr-org-2470 90 14 but but CC blog-dshr-org-2470 90 15 that that IN blog-dshr-org-2470 90 16 in in IN blog-dshr-org-2470 90 17 and and CC blog-dshr-org-2470 90 18 of of IN blog-dshr-org-2470 90 19 itself -PRON- PRP blog-dshr-org-2470 90 20 does do VBZ blog-dshr-org-2470 90 21 not not RB blog-dshr-org-2470 90 22 indicate indicate VB blog-dshr-org-2470 90 23 that that IN blog-dshr-org-2470 90 24 it -PRON- PRP blog-dshr-org-2470 90 25 is be VBZ blog-dshr-org-2470 90 26 malign malign NN blog-dshr-org-2470 90 27 : : : blog-dshr-org-2470 90 28 To to TO blog-dshr-org-2470 90 29 mitigate mitigate VB blog-dshr-org-2470 90 30 this this DT blog-dshr-org-2470 90 31 problem problem NN blog-dshr-org-2470 90 32 a a DT blog-dshr-org-2470 90 33 minimum minimum JJ blog-dshr-org-2470 90 34 time time NN blog-dshr-org-2470 90 35 between between IN blog-dshr-org-2470 90 36 package package NN blog-dshr-org-2470 90 37 updates update NNS blog-dshr-org-2470 90 38 can can MD blog-dshr-org-2470 90 39 be be VB blog-dshr-org-2470 90 40 introduced introduce VBN blog-dshr-org-2470 90 41 . . . blog-dshr-org-2470 91 1 This this DT blog-dshr-org-2470 91 2 can can MD blog-dshr-org-2470 91 3 be be VB blog-dshr-org-2470 91 4 achieved achieve VBN blog-dshr-org-2470 91 5 by by IN blog-dshr-org-2470 91 6 a a DT blog-dshr-org-2470 91 7 fixing fix VBG blog-dshr-org-2470 91 8 the the DT blog-dshr-org-2470 91 9 issuance issuance NN blog-dshr-org-2470 91 10 of of IN blog-dshr-org-2470 91 11 release release NN blog-dshr-org-2470 91 12 files file NNS blog-dshr-org-2470 91 13 and and CC blog-dshr-org-2470 91 14 their -PRON- PRP$ blog-dshr-org-2470 91 15 log log NN blog-dshr-org-2470 91 16 submission submission NN blog-dshr-org-2470 91 17 to to IN blog-dshr-org-2470 91 18 a a DT blog-dshr-org-2470 91 19 static static JJ blog-dshr-org-2470 91 20 frequency frequency NN blog-dshr-org-2470 91 21 , , , blog-dshr-org-2470 91 22 or or CC blog-dshr-org-2470 91 23 by by IN blog-dshr-org-2470 91 24 alerting alert VBG blog-dshr-org-2470 91 25 on on IN blog-dshr-org-2470 91 26 quick quick JJ blog-dshr-org-2470 91 27 subsequent subsequent JJ blog-dshr-org-2470 91 28 updates update NNS blog-dshr-org-2470 91 29 to to IN blog-dshr-org-2470 91 30 one one CD blog-dshr-org-2470 91 31 package package NN blog-dshr-org-2470 91 32 . . . blog-dshr-org-2470 92 1 There there EX blog-dshr-org-2470 92 2 may may MD blog-dshr-org-2470 92 3 be be VB blog-dshr-org-2470 92 4 good good JJ blog-dshr-org-2470 92 5 reasons reason NNS blog-dshr-org-2470 92 6 for for IN blog-dshr-org-2470 92 7 releasing release VBG blog-dshr-org-2470 92 8 a a DT blog-dshr-org-2470 92 9 new new JJ blog-dshr-org-2470 92 10 update update NN blog-dshr-org-2470 92 11 shortly shortly RB blog-dshr-org-2470 92 12 after after IN blog-dshr-org-2470 92 13 its -PRON- PRP$ blog-dshr-org-2470 92 14 predecessor predecessor NN blog-dshr-org-2470 92 15 ; ; : blog-dshr-org-2470 92 16 for for IN blog-dshr-org-2470 92 17 example example NN blog-dshr-org-2470 92 18 a a DT blog-dshr-org-2470 92 19 vulnerability vulnerability NN blog-dshr-org-2470 92 20 might may MD blog-dshr-org-2470 92 21 be be VB blog-dshr-org-2470 92 22 discovered discover VBN blog-dshr-org-2470 92 23 in in IN blog-dshr-org-2470 92 24 the the DT blog-dshr-org-2470 92 25 predecessor predecessor NN blog-dshr-org-2470 92 26 shortly shortly RB blog-dshr-org-2470 92 27 after after IN blog-dshr-org-2470 92 28 release release NN blog-dshr-org-2470 92 29 . . . blog-dshr-org-2470 93 1 In in IN blog-dshr-org-2470 93 2 the the DT blog-dshr-org-2470 93 3 hidden hide VBN blog-dshr-org-2470 93 4 version version NN blog-dshr-org-2470 93 5 attack attack NN blog-dshr-org-2470 93 6 , , , blog-dshr-org-2470 93 7 the the DT blog-dshr-org-2470 93 8 attacker attacker NN blog-dshr-org-2470 93 9 increases increase VBZ blog-dshr-org-2470 93 10 a a DT blog-dshr-org-2470 93 11 version version NN blog-dshr-org-2470 93 12 number number NN blog-dshr-org-2470 93 13 in in IN blog-dshr-org-2470 93 14 order order NN blog-dshr-org-2470 93 15 to to TO blog-dshr-org-2470 93 16 get get VB blog-dshr-org-2470 93 17 the the DT blog-dshr-org-2470 93 18 victim victim NN blog-dshr-org-2470 93 19 to to TO blog-dshr-org-2470 93 20 update update VB blog-dshr-org-2470 93 21 a a DT blog-dshr-org-2470 93 22 package package NN blog-dshr-org-2470 93 23 . . . blog-dshr-org-2470 94 1 The the DT blog-dshr-org-2470 94 2 victim victim NN blog-dshr-org-2470 94 3 will will MD blog-dshr-org-2470 94 4 install install VB blog-dshr-org-2470 94 5 this this DT blog-dshr-org-2470 94 6 backdoored backdoore VBN blog-dshr-org-2470 94 7 update update NN blog-dshr-org-2470 94 8 . . . blog-dshr-org-2470 95 1 The the DT blog-dshr-org-2470 95 2 monitor monitor NN blog-dshr-org-2470 95 3 detects detect VBZ blog-dshr-org-2470 95 4 the the DT blog-dshr-org-2470 95 5 hidden hide VBN blog-dshr-org-2470 95 6 version version NN blog-dshr-org-2470 95 7 attack attack NN blog-dshr-org-2470 95 8 due due IN blog-dshr-org-2470 95 9 to to IN blog-dshr-org-2470 95 10 the the DT blog-dshr-org-2470 95 11 irregular irregular JJ blog-dshr-org-2470 95 12 release release NN blog-dshr-org-2470 95 13 file file NN blog-dshr-org-2470 95 14 publication publication NN blog-dshr-org-2470 95 15 . . . blog-dshr-org-2470 96 1 There there EX blog-dshr-org-2470 96 2 are be VBP blog-dshr-org-2470 96 3 now now RB blog-dshr-org-2470 96 4 two two CD blog-dshr-org-2470 96 5 cases case NNS blog-dshr-org-2470 96 6 to to TO blog-dshr-org-2470 96 7 be be VB blog-dshr-org-2470 96 8 considered consider VBN blog-dshr-org-2470 96 9 . . . blog-dshr-org-2470 97 1 The the DT blog-dshr-org-2470 97 2 backdoor backdoor NN blog-dshr-org-2470 97 3 may may MD blog-dshr-org-2470 97 4 be be VB blog-dshr-org-2470 97 5 in in IN blog-dshr-org-2470 97 6 the the DT blog-dshr-org-2470 97 7 binary binary JJ blog-dshr-org-2470 97 8 package package NN blog-dshr-org-2470 97 9 , , , blog-dshr-org-2470 97 10 or or CC blog-dshr-org-2470 97 11 it -PRON- PRP blog-dshr-org-2470 97 12 may may MD blog-dshr-org-2470 97 13 be be VB blog-dshr-org-2470 97 14 in in IN blog-dshr-org-2470 97 15 the the DT blog-dshr-org-2470 97 16 source source NN blog-dshr-org-2470 97 17 package package NN blog-dshr-org-2470 97 18 . . . blog-dshr-org-2470 98 1 The the DT blog-dshr-org-2470 98 2 first first JJ blog-dshr-org-2470 98 3 case case NN blog-dshr-org-2470 98 4 will will MD blog-dshr-org-2470 98 5 be be VB blog-dshr-org-2470 98 6 detected detect VBN blog-dshr-org-2470 98 7 by by IN blog-dshr-org-2470 98 8 monitors monitor NNS blog-dshr-org-2470 98 9 verifying verify VBG blog-dshr-org-2470 98 10 the the DT blog-dshr-org-2470 98 11 reproducible reproducible NN blog-dshr-org-2470 98 12 builds build VBZ blog-dshr-org-2470 98 13 property property NN blog-dshr-org-2470 98 14 . . . blog-dshr-org-2470 99 1 A a DT blog-dshr-org-2470 99 2 monitor monitor NN blog-dshr-org-2470 99 3 can can MD blog-dshr-org-2470 99 4 rebuild rebuild VB blog-dshr-org-2470 99 5 all all DT blog-dshr-org-2470 99 6 changed change VBN blog-dshr-org-2470 99 7 source source NN blog-dshr-org-2470 99 8 packages package NNS blog-dshr-org-2470 99 9 on on IN blog-dshr-org-2470 99 10 every every DT blog-dshr-org-2470 99 11 update update NN blog-dshr-org-2470 99 12 and and CC blog-dshr-org-2470 99 13 check check VB blog-dshr-org-2470 99 14 if if IN blog-dshr-org-2470 99 15 the the DT blog-dshr-org-2470 99 16 resulting result VBG blog-dshr-org-2470 99 17 binary binary JJ blog-dshr-org-2470 99 18 matches match NNS blog-dshr-org-2470 99 19 . . . blog-dshr-org-2470 100 1 If if IN blog-dshr-org-2470 100 2 not not RB blog-dshr-org-2470 100 3 , , , blog-dshr-org-2470 100 4 the the DT blog-dshr-org-2470 100 5 blame blame NN blog-dshr-org-2470 100 6 falls fall VBZ blog-dshr-org-2470 100 7 clearly clearly RB blog-dshr-org-2470 100 8 on on IN blog-dshr-org-2470 100 9 the the DT blog-dshr-org-2470 100 10 archive archive NN blog-dshr-org-2470 100 11 , , , blog-dshr-org-2470 100 12 because because IN blog-dshr-org-2470 100 13 the the DT blog-dshr-org-2470 100 14 source source NN blog-dshr-org-2470 100 15 does do VBZ blog-dshr-org-2470 100 16 not not RB blog-dshr-org-2470 100 17 correspond correspond VB blog-dshr-org-2470 100 18 to to IN blog-dshr-org-2470 100 19 the the DT blog-dshr-org-2470 100 20 binary binary NN blog-dshr-org-2470 100 21 , , , blog-dshr-org-2470 100 22 which which WDT blog-dshr-org-2470 100 23 can can MD blog-dshr-org-2470 100 24 be be VB blog-dshr-org-2470 100 25 demonstrated demonstrate VBN blog-dshr-org-2470 100 26 by by IN blog-dshr-org-2470 100 27 exploiting exploit VBG blog-dshr-org-2470 100 28 reproducible reproducible NN blog-dshr-org-2470 100 29 builds build VBZ blog-dshr-org-2470 100 30 . . . blog-dshr-org-2470 101 1 The the DT blog-dshr-org-2470 101 2 second second JJ blog-dshr-org-2470 101 3 case case NN blog-dshr-org-2470 101 4 requires require VBZ blog-dshr-org-2470 101 5 investigation investigation NN blog-dshr-org-2470 101 6 of of IN blog-dshr-org-2470 101 7 the the DT blog-dshr-org-2470 101 8 packages package NNS blog-dshr-org-2470 101 9 modified modify VBN blog-dshr-org-2470 101 10 by by IN blog-dshr-org-2470 101 11 the the DT blog-dshr-org-2470 101 12 update update NN blog-dshr-org-2470 101 13 . . . blog-dshr-org-2470 102 1 The the DT blog-dshr-org-2470 102 2 source source NN blog-dshr-org-2470 102 3 code code NN blog-dshr-org-2470 102 4 modifications modification NNS blog-dshr-org-2470 102 5 can can MD blog-dshr-org-2470 102 6 be be VB blog-dshr-org-2470 102 7 investigated investigate VBN blog-dshr-org-2470 102 8 for for IN blog-dshr-org-2470 102 9 the the DT blog-dshr-org-2470 102 10 changed change VBN blog-dshr-org-2470 102 11 packages package NNS blog-dshr-org-2470 102 12 , , , blog-dshr-org-2470 102 13 because because IN blog-dshr-org-2470 102 14 all all DT blog-dshr-org-2470 102 15 source source NN blog-dshr-org-2470 102 16 code code NN blog-dshr-org-2470 102 17 is be VBZ blog-dshr-org-2470 102 18 logged log VBN blog-dshr-org-2470 102 19 . . . blog-dshr-org-2470 103 1 The the DT blog-dshr-org-2470 103 2 fact fact NN blog-dshr-org-2470 103 3 that that IN blog-dshr-org-2470 103 4 source source NN blog-dshr-org-2470 103 5 code code NN blog-dshr-org-2470 103 6 can can MD blog-dshr-org-2470 103 7 be be VB blog-dshr-org-2470 103 8 analyzed analyze VBN blog-dshr-org-2470 103 9 , , , blog-dshr-org-2470 103 10 and and CC blog-dshr-org-2470 103 11 no no DT blog-dshr-org-2470 103 12 analysis analysis NN blog-dshr-org-2470 103 13 on on IN blog-dshr-org-2470 103 14 binaries binary NNS blog-dshr-org-2470 103 15 is be VBZ blog-dshr-org-2470 103 16 required require VBN blog-dshr-org-2470 103 17 , , , blog-dshr-org-2470 103 18 makes make VBZ blog-dshr-org-2470 103 19 the the DT blog-dshr-org-2470 103 20 investigation investigation NN blog-dshr-org-2470 103 21 of of IN blog-dshr-org-2470 103 22 the the DT blog-dshr-org-2470 103 23 hidden hide VBN blog-dshr-org-2470 103 24 version version NNP blog-dshr-org-2470 103 25 alert alert NNP blog-dshr-org-2470 103 26 simpler simpler RBR blog-dshr-org-2470 103 27 . . . blog-dshr-org-2470 104 1 The the DT blog-dshr-org-2470 104 2 blame blame NN blog-dshr-org-2470 104 3 for for IN blog-dshr-org-2470 104 4 this this DT blog-dshr-org-2470 104 5 case case NN blog-dshr-org-2470 104 6 falls fall VBZ blog-dshr-org-2470 104 7 on on IN blog-dshr-org-2470 104 8 the the DT blog-dshr-org-2470 104 9 maintainer maintainer NN blog-dshr-org-2470 104 10 , , , blog-dshr-org-2470 104 11 who who WP blog-dshr-org-2470 104 12 can can MD blog-dshr-org-2470 104 13 be be VB blog-dshr-org-2470 104 14 identified identify VBN blog-dshr-org-2470 104 15 by by IN blog-dshr-org-2470 104 16 their -PRON- PRP$ blog-dshr-org-2470 104 17 signature signature NN blog-dshr-org-2470 104 18 on on IN blog-dshr-org-2470 104 19 the the DT blog-dshr-org-2470 104 20 source source NN blog-dshr-org-2470 104 21 package package NN blog-dshr-org-2470 104 22 . . . blog-dshr-org-2470 105 1 If if IN blog-dshr-org-2470 105 2 the the DT blog-dshr-org-2470 105 3 upload upload NN blog-dshr-org-2470 105 4 was be VBD blog-dshr-org-2470 105 5 signed sign VBN blog-dshr-org-2470 105 6 by by IN blog-dshr-org-2470 105 7 a a DT blog-dshr-org-2470 105 8 key key NN blog-dshr-org-2470 105 9 not not RB blog-dshr-org-2470 105 10 in in IN blog-dshr-org-2470 105 11 the the DT blog-dshr-org-2470 105 12 allowed allow VBN blog-dshr-org-2470 105 13 set set NN blog-dshr-org-2470 105 14 , , , blog-dshr-org-2470 105 15 the the DT blog-dshr-org-2470 105 16 blame blame NN blog-dshr-org-2470 105 17 falls fall VBZ blog-dshr-org-2470 105 18 on on IN blog-dshr-org-2470 105 19 the the DT blog-dshr-org-2470 105 20 archive archive NN blog-dshr-org-2470 105 21 for for IN blog-dshr-org-2470 105 22 failing fail VBG blog-dshr-org-2470 105 23 to to TO blog-dshr-org-2470 105 24 authorize authorize VB blog-dshr-org-2470 105 25 correctly correctly RB blog-dshr-org-2470 105 26 . . . blog-dshr-org-2470 106 1 If if IN blog-dshr-org-2470 106 2 the the DT blog-dshr-org-2470 106 3 package package NN blog-dshr-org-2470 106 4 version version NN blog-dshr-org-2470 106 5 numbers number NNS blog-dshr-org-2470 106 6 in in IN blog-dshr-org-2470 106 7 the the DT blog-dshr-org-2470 106 8 meta meta JJ blog-dshr-org-2470 106 9 data datum NNS blog-dshr-org-2470 106 10 are be VBP blog-dshr-org-2470 106 11 inconsistent inconsistent JJ blog-dshr-org-2470 106 12 , , , blog-dshr-org-2470 106 13 this this DT blog-dshr-org-2470 106 14 constitutes constitute VBZ blog-dshr-org-2470 106 15 a a DT blog-dshr-org-2470 106 16 misbehavior misbehavior NN blog-dshr-org-2470 106 17 by by IN blog-dshr-org-2470 106 18 the the DT blog-dshr-org-2470 106 19 submitting submit VBG blog-dshr-org-2470 106 20 archive archive NN blog-dshr-org-2470 106 21 . . . blog-dshr-org-2470 107 1 It -PRON- PRP blog-dshr-org-2470 107 2 can can MD blog-dshr-org-2470 107 3 easily easily RB blog-dshr-org-2470 107 4 be be VB blog-dshr-org-2470 107 5 detected detect VBN blog-dshr-org-2470 107 6 by by IN blog-dshr-org-2470 107 7 a a DT blog-dshr-org-2470 107 8 monitor monitor NN blog-dshr-org-2470 107 9 . . . blog-dshr-org-2470 108 1 Using use VBG blog-dshr-org-2470 108 2 the the DT blog-dshr-org-2470 108 3 release release NN blog-dshr-org-2470 108 4 file file NN blog-dshr-org-2470 108 5 the the DT blog-dshr-org-2470 108 6 monitor monitor NN blog-dshr-org-2470 108 7 can can MD blog-dshr-org-2470 108 8 also also RB blog-dshr-org-2470 108 9 easily easily RB blog-dshr-org-2470 108 10 ensure ensure VB blog-dshr-org-2470 108 11 , , , blog-dshr-org-2470 108 12 by by IN blog-dshr-org-2470 108 13 demanding demand VBG blog-dshr-org-2470 108 14 inclusion inclusion NN blog-dshr-org-2470 108 15 proofs proof NNS blog-dshr-org-2470 108 16 , , , blog-dshr-org-2470 108 17 that that IN blog-dshr-org-2470 108 18 all all DT blog-dshr-org-2470 108 19 required require VBN blog-dshr-org-2470 108 20 files file NNS blog-dshr-org-2470 108 21 have have VBP blog-dshr-org-2470 108 22 been be VBN blog-dshr-org-2470 108 23 logged log VBN blog-dshr-org-2470 108 24 . . . blog-dshr-org-2470 109 1 Note note VB blog-dshr-org-2470 109 2 that that IN blog-dshr-org-2470 109 3 although although IN blog-dshr-org-2470 109 4 their -PRON- PRP$ blog-dshr-org-2470 109 5 system system NN blog-dshr-org-2470 109 6 's 's POS blog-dshr-org-2470 109 7 monitors monitor NNS blog-dshr-org-2470 109 8 detect detect VBP blog-dshr-org-2470 109 9 this this DT blog-dshr-org-2470 109 10 attack attack NN blog-dshr-org-2470 109 11 , , , blog-dshr-org-2470 109 12 and and CC blog-dshr-org-2470 109 13 can can MD blog-dshr-org-2470 109 14 correctly correctly RB blog-dshr-org-2470 109 15 attribute attribute VB blog-dshr-org-2470 109 16 it -PRON- PRP blog-dshr-org-2470 109 17 , , , blog-dshr-org-2470 109 18 they -PRON- PRP blog-dshr-org-2470 109 19 do do VBP blog-dshr-org-2470 109 20 so so RB blog-dshr-org-2470 109 21 asynchronously asynchronously RB blog-dshr-org-2470 109 22 . . . blog-dshr-org-2470 110 1 They -PRON- PRP blog-dshr-org-2470 110 2 do do VBP blog-dshr-org-2470 110 3 not not RB blog-dshr-org-2470 110 4 prevent prevent VB blog-dshr-org-2470 110 5 the the DT blog-dshr-org-2470 110 6 victim victim NN blog-dshr-org-2470 110 7 installing instal VBG blog-dshr-org-2470 110 8 the the DT blog-dshr-org-2470 110 9 backdoored backdoore VBN blog-dshr-org-2470 110 10 update update NN blog-dshr-org-2470 110 11 . . . blog-dshr-org-2470 111 1 The the DT blog-dshr-org-2470 111 2 Split Split NNP blog-dshr-org-2470 111 3 View View NNP blog-dshr-org-2470 111 4 Attack Attack NNP blog-dshr-org-2470 111 5 The the DT blog-dshr-org-2470 111 6 logs log NNS blog-dshr-org-2470 111 7 can can MD blog-dshr-org-2470 111 8 not not RB blog-dshr-org-2470 111 9 be be VB blog-dshr-org-2470 111 10 assumed assume VBN blog-dshr-org-2470 111 11 to to TO blog-dshr-org-2470 111 12 be be VB blog-dshr-org-2470 111 13 above above IN blog-dshr-org-2470 111 14 suspicion suspicion NN blog-dshr-org-2470 111 15 . . . blog-dshr-org-2470 112 1 Hof Hof NNP blog-dshr-org-2470 112 2 and and CC blog-dshr-org-2470 112 3 Carle Carle NNP blog-dshr-org-2470 112 4 describe describe VBP blog-dshr-org-2470 112 5 a a DT blog-dshr-org-2470 112 6 log log NN blog-dshr-org-2470 112 7 - - HYPH blog-dshr-org-2470 112 8 based base VBN blog-dshr-org-2470 112 9 attack attack NN blog-dshr-org-2470 112 10 : : : blog-dshr-org-2470 112 11 The the DT blog-dshr-org-2470 112 12 most most RBS blog-dshr-org-2470 112 13 significant significant JJ blog-dshr-org-2470 112 14 attack attack NN blog-dshr-org-2470 112 15 by by IN blog-dshr-org-2470 112 16 the the DT blog-dshr-org-2470 112 17 log log NN blog-dshr-org-2470 112 18 or or CC blog-dshr-org-2470 112 19 with with IN blog-dshr-org-2470 112 20 the the DT blog-dshr-org-2470 112 21 collusion collusion NN blog-dshr-org-2470 112 22 of of IN blog-dshr-org-2470 112 23 the the DT blog-dshr-org-2470 112 24 log log NN blog-dshr-org-2470 112 25 is be VBZ blog-dshr-org-2470 112 26 equivocation equivocation NN blog-dshr-org-2470 112 27 . . . blog-dshr-org-2470 113 1 In in IN blog-dshr-org-2470 113 2 a a DT blog-dshr-org-2470 113 3 split split NN blog-dshr-org-2470 113 4 - - HYPH blog-dshr-org-2470 113 5 view view NN blog-dshr-org-2470 113 6 or or CC blog-dshr-org-2470 113 7 equivocation equivocation NN blog-dshr-org-2470 113 8 attack attack NN blog-dshr-org-2470 113 9 , , , blog-dshr-org-2470 113 10 a a DT blog-dshr-org-2470 113 11 malicious malicious JJ blog-dshr-org-2470 113 12 log log NN blog-dshr-org-2470 113 13 presents present VBZ blog-dshr-org-2470 113 14 different different JJ blog-dshr-org-2470 113 15 versions version NNS blog-dshr-org-2470 113 16 of of IN blog-dshr-org-2470 113 17 the the DT blog-dshr-org-2470 113 18 Merkle Merkle NNP blog-dshr-org-2470 113 19 tree tree NN blog-dshr-org-2470 113 20 to to IN blog-dshr-org-2470 113 21 the the DT blog-dshr-org-2470 113 22 victim victim NN blog-dshr-org-2470 113 23 and and CC blog-dshr-org-2470 113 24 to to IN blog-dshr-org-2470 113 25 everybody everybody NN blog-dshr-org-2470 113 26 else else RB blog-dshr-org-2470 113 27 . . . blog-dshr-org-2470 114 1 Each each DT blog-dshr-org-2470 114 2 tree tree NN blog-dshr-org-2470 114 3 version version NN blog-dshr-org-2470 114 4 is be VBZ blog-dshr-org-2470 114 5 kept keep VBN blog-dshr-org-2470 114 6 consistent consistent JJ blog-dshr-org-2470 114 7 in in IN blog-dshr-org-2470 114 8 itself -PRON- PRP blog-dshr-org-2470 114 9 . . . blog-dshr-org-2470 115 1 The the DT blog-dshr-org-2470 115 2 tree tree NN blog-dshr-org-2470 115 3 presented present VBD blog-dshr-org-2470 115 4 to to IN blog-dshr-org-2470 115 5 the the DT blog-dshr-org-2470 115 6 victim victim NN blog-dshr-org-2470 115 7 will will MD blog-dshr-org-2470 115 8 include include VB blog-dshr-org-2470 115 9 a a DT blog-dshr-org-2470 115 10 leaf leaf NN blog-dshr-org-2470 115 11 that that WDT blog-dshr-org-2470 115 12 is be VBZ blog-dshr-org-2470 115 13 malicious malicious JJ blog-dshr-org-2470 115 14 in in IN blog-dshr-org-2470 115 15 some some DT blog-dshr-org-2470 115 16 way way NN blog-dshr-org-2470 115 17 , , , blog-dshr-org-2470 115 18 such such JJ blog-dshr-org-2470 115 19 as as IN blog-dshr-org-2470 115 20 an an DT blog-dshr-org-2470 115 21 update update NN blog-dshr-org-2470 115 22 with with IN blog-dshr-org-2470 115 23 a a DT blog-dshr-org-2470 115 24 backdoor backdoor NN blog-dshr-org-2470 115 25 . . . blog-dshr-org-2470 116 1 It -PRON- PRP blog-dshr-org-2470 116 2 might may MD blog-dshr-org-2470 116 3 also also RB blog-dshr-org-2470 116 4 omit omit VB blog-dshr-org-2470 116 5 a a DT blog-dshr-org-2470 116 6 leaf leaf NN blog-dshr-org-2470 116 7 in in IN blog-dshr-org-2470 116 8 order order NN blog-dshr-org-2470 116 9 to to TO blog-dshr-org-2470 116 10 hide hide VB blog-dshr-org-2470 116 11 an an DT blog-dshr-org-2470 116 12 update update NN blog-dshr-org-2470 116 13 . . . blog-dshr-org-2470 117 1 This this DT blog-dshr-org-2470 117 2 is be VBZ blog-dshr-org-2470 117 3 a a DT blog-dshr-org-2470 117 4 powerful powerful JJ blog-dshr-org-2470 117 5 attack attack NN blog-dshr-org-2470 117 6 within within IN blog-dshr-org-2470 117 7 the the DT blog-dshr-org-2470 117 8 threat threat NN blog-dshr-org-2470 117 9 model model NN blog-dshr-org-2470 117 10 that that WDT blog-dshr-org-2470 117 11 violates violate VBZ blog-dshr-org-2470 117 12 the the DT blog-dshr-org-2470 117 13 security security NN blog-dshr-org-2470 117 14 goals goal NNS blog-dshr-org-2470 117 15 and and CC blog-dshr-org-2470 117 16 must must MD blog-dshr-org-2470 117 17 therefore therefore RB blog-dshr-org-2470 117 18 be be VB blog-dshr-org-2470 117 19 defended defend VBN blog-dshr-org-2470 117 20 . . . blog-dshr-org-2470 118 1 A a DT blog-dshr-org-2470 118 2 defense defense NN blog-dshr-org-2470 118 3 against against IN blog-dshr-org-2470 118 4 this this DT blog-dshr-org-2470 118 5 attack attack NN blog-dshr-org-2470 118 6 requires require VBZ blog-dshr-org-2470 118 7 the the DT blog-dshr-org-2470 118 8 client client NN blog-dshr-org-2470 118 9 to to TO blog-dshr-org-2470 118 10 learn learn VB blog-dshr-org-2470 118 11 if if IN blog-dshr-org-2470 118 12 they -PRON- PRP blog-dshr-org-2470 118 13 are be VBP blog-dshr-org-2470 118 14 served serve VBN blog-dshr-org-2470 118 15 from from IN blog-dshr-org-2470 118 16 the the DT blog-dshr-org-2470 118 17 same same JJ blog-dshr-org-2470 118 18 tree tree NN blog-dshr-org-2470 118 19 as as IN blog-dshr-org-2470 118 20 the the DT blog-dshr-org-2470 118 21 others other NNS blog-dshr-org-2470 118 22 . . . blog-dshr-org-2470 119 1 Their -PRON- PRP$ blog-dshr-org-2470 119 2 defense defense NN blog-dshr-org-2470 119 3 requires require VBZ blog-dshr-org-2470 119 4 that that IN blog-dshr-org-2470 119 5 their -PRON- PRP$ blog-dshr-org-2470 119 6 be be VB blog-dshr-org-2470 119 7 multiple multiple JJ blog-dshr-org-2470 119 8 logs log NNS blog-dshr-org-2470 119 9 under under IN blog-dshr-org-2470 119 10 independent independent JJ blog-dshr-org-2470 119 11 administration administration NN blog-dshr-org-2470 119 12 , , , blog-dshr-org-2470 119 13 perhaps perhaps RB blog-dshr-org-2470 119 14 run run VB blog-dshr-org-2470 119 15 by by IN blog-dshr-org-2470 119 16 different different JJ blog-dshr-org-2470 119 17 Linux Linux NNP blog-dshr-org-2470 119 18 distributions distribution NNS blog-dshr-org-2470 119 19 . . . blog-dshr-org-2470 120 1 Each each DT blog-dshr-org-2470 120 2 time time NN blog-dshr-org-2470 120 3 a a DT blog-dshr-org-2470 120 4 " " `` blog-dshr-org-2470 120 5 committing commit VBG blog-dshr-org-2470 120 6 " " '' blog-dshr-org-2470 120 7 log log NN blog-dshr-org-2470 120 8 generated generate VBD blog-dshr-org-2470 120 9 a a DT blog-dshr-org-2470 120 10 new new JJ blog-dshr-org-2470 120 11 tree tree NN blog-dshr-org-2470 120 12 root root NN blog-dshr-org-2470 120 13 containing contain VBG blog-dshr-org-2470 120 14 new new JJ blog-dshr-org-2470 120 15 package package NN blog-dshr-org-2470 120 16 submissions submission NNS blog-dshr-org-2470 120 17 , , , blog-dshr-org-2470 120 18 it -PRON- PRP blog-dshr-org-2470 120 19 would would MD blog-dshr-org-2470 120 20 be be VB blog-dshr-org-2470 120 21 required require VBN blog-dshr-org-2470 120 22 to to TO blog-dshr-org-2470 120 23 submit submit VB blog-dshr-org-2470 120 24 a a DT blog-dshr-org-2470 120 25 signed sign VBN blog-dshr-org-2470 120 26 copy copy NN blog-dshr-org-2470 120 27 of of IN blog-dshr-org-2470 120 28 the the DT blog-dshr-org-2470 120 29 root root NN blog-dshr-org-2470 120 30 to to IN blog-dshr-org-2470 120 31 one one CD blog-dshr-org-2470 120 32 or or CC blog-dshr-org-2470 120 33 more more JJR blog-dshr-org-2470 120 34 " " `` blog-dshr-org-2470 120 35 witness witness NN blog-dshr-org-2470 120 36 " " '' blog-dshr-org-2470 120 37 logs log NNS blog-dshr-org-2470 120 38 under under IN blog-dshr-org-2470 120 39 independent independent JJ blog-dshr-org-2470 120 40 administration administration NN blog-dshr-org-2470 120 41 . . . blog-dshr-org-2470 121 1 The the DT blog-dshr-org-2470 121 2 " " `` blog-dshr-org-2470 121 3 committing commit VBG blog-dshr-org-2470 121 4 " " '' blog-dshr-org-2470 121 5 log log NN blog-dshr-org-2470 121 6 will will MD blog-dshr-org-2470 121 7 obtain obtain VB blog-dshr-org-2470 121 8 commitments commitment NNS blog-dshr-org-2470 121 9 from from IN blog-dshr-org-2470 121 10 the the DT blog-dshr-org-2470 121 11 " " `` blog-dshr-org-2470 121 12 witness witness NN blog-dshr-org-2470 121 13 " " '' blog-dshr-org-2470 121 14 logs log NNS blog-dshr-org-2470 121 15 , , , blog-dshr-org-2470 121 16 and and CC blog-dshr-org-2470 121 17 supply supply VB blog-dshr-org-2470 121 18 them -PRON- PRP blog-dshr-org-2470 121 19 to to IN blog-dshr-org-2470 121 20 clients client NNS blog-dshr-org-2470 121 21 . . . blog-dshr-org-2470 122 1 Clients client NNS blog-dshr-org-2470 122 2 can can MD blog-dshr-org-2470 122 3 then then RB blog-dshr-org-2470 122 4 verify verify VB blog-dshr-org-2470 122 5 that that IN blog-dshr-org-2470 122 6 the the DT blog-dshr-org-2470 122 7 root root NN blog-dshr-org-2470 122 8 they -PRON- PRP blog-dshr-org-2470 122 9 obtain obtain VBP blog-dshr-org-2470 122 10 from from IN blog-dshr-org-2470 122 11 the the DT blog-dshr-org-2470 122 12 " " `` blog-dshr-org-2470 122 13 committing commit VBG blog-dshr-org-2470 122 14 " " '' blog-dshr-org-2470 122 15 log log NN blog-dshr-org-2470 122 16 matches match NNS blog-dshr-org-2470 122 17 that that WDT blog-dshr-org-2470 122 18 obtained obtain VBD blog-dshr-org-2470 122 19 directly directly RB blog-dshr-org-2470 122 20 from from IN blog-dshr-org-2470 122 21 the the DT blog-dshr-org-2470 122 22 " " `` blog-dshr-org-2470 122 23 witness witness NN blog-dshr-org-2470 122 24 " " '' blog-dshr-org-2470 122 25 logs log NNS blog-dshr-org-2470 122 26 : : : blog-dshr-org-2470 122 27 When when WRB blog-dshr-org-2470 122 28 the the DT blog-dshr-org-2470 122 29 client client NN blog-dshr-org-2470 122 30 now now RB blog-dshr-org-2470 122 31 verifies verify VBZ blog-dshr-org-2470 122 32 a a DT blog-dshr-org-2470 122 33 log log NN blog-dshr-org-2470 122 34 entry entry NN blog-dshr-org-2470 122 35 with with IN blog-dshr-org-2470 122 36 the the DT blog-dshr-org-2470 122 37 committing commit VBG blog-dshr-org-2470 122 38 log log NN blog-dshr-org-2470 122 39 , , , blog-dshr-org-2470 122 40 it -PRON- PRP blog-dshr-org-2470 122 41 also also RB blog-dshr-org-2470 122 42 has have VBZ blog-dshr-org-2470 122 43 to to TO blog-dshr-org-2470 122 44 verify verify VB blog-dshr-org-2470 122 45 that that IN blog-dshr-org-2470 122 46 a a DT blog-dshr-org-2470 122 47 tree tree NN blog-dshr-org-2470 122 48 root root NN blog-dshr-org-2470 122 49 covering cover VBG blog-dshr-org-2470 122 50 this this DT blog-dshr-org-2470 122 51 entry entry NN blog-dshr-org-2470 122 52 was be VBD blog-dshr-org-2470 122 53 submitted submit VBN blog-dshr-org-2470 122 54 into into IN blog-dshr-org-2470 122 55 the the DT blog-dshr-org-2470 122 56 witnessing witness VBG blog-dshr-org-2470 122 57 log log NN blog-dshr-org-2470 122 58 . . . blog-dshr-org-2470 123 1 Additionally additionally RB blog-dshr-org-2470 123 2 , , , blog-dshr-org-2470 123 3 the the DT blog-dshr-org-2470 123 4 client client NN blog-dshr-org-2470 123 5 verifies verify VBZ blog-dshr-org-2470 123 6 the the DT blog-dshr-org-2470 123 7 append append NN blog-dshr-org-2470 123 8 - - HYPH blog-dshr-org-2470 123 9 only only RB blog-dshr-org-2470 123 10 property property NN blog-dshr-org-2470 123 11 of of IN blog-dshr-org-2470 123 12 the the DT blog-dshr-org-2470 123 13 witnessing witness VBG blog-dshr-org-2470 123 14 log log NN blog-dshr-org-2470 123 15 . . . blog-dshr-org-2470 124 1 The the DT blog-dshr-org-2470 124 2 witnessing witness VBG blog-dshr-org-2470 124 3 log log NN blog-dshr-org-2470 124 4 introduces introduce VBZ blog-dshr-org-2470 124 5 additional additional JJ blog-dshr-org-2470 124 6 monitoring monitoring NN blog-dshr-org-2470 124 7 requirements requirement NNS blog-dshr-org-2470 124 8 . . . blog-dshr-org-2470 125 1 Next next RB blog-dshr-org-2470 125 2 to to IN blog-dshr-org-2470 125 3 the the DT blog-dshr-org-2470 125 4 usual usual JJ blog-dshr-org-2470 125 5 monitoring monitoring NN blog-dshr-org-2470 125 6 of of IN blog-dshr-org-2470 125 7 the the DT blog-dshr-org-2470 125 8 append append NN blog-dshr-org-2470 125 9 - - HYPH blog-dshr-org-2470 125 10 only only RB blog-dshr-org-2470 125 11 operation operation NN blog-dshr-org-2470 125 12 , , , blog-dshr-org-2470 125 13 we -PRON- PRP blog-dshr-org-2470 125 14 need need VBP blog-dshr-org-2470 125 15 to to TO blog-dshr-org-2470 125 16 check check VB blog-dshr-org-2470 125 17 that that IN blog-dshr-org-2470 125 18 no no DT blog-dshr-org-2470 125 19 equivocating equivocate VBG blog-dshr-org-2470 125 20 tree tree NN blog-dshr-org-2470 125 21 roots root NNS blog-dshr-org-2470 125 22 are be VBP blog-dshr-org-2470 125 23 included include VBN blog-dshr-org-2470 125 24 . . . blog-dshr-org-2470 126 1 To to IN blog-dshr-org-2470 126 2 this this DT blog-dshr-org-2470 126 3 end end NN blog-dshr-org-2470 126 4 , , , blog-dshr-org-2470 126 5 a a DT blog-dshr-org-2470 126 6 monitor monitor NN blog-dshr-org-2470 126 7 follows follow VBZ blog-dshr-org-2470 126 8 all all DT blog-dshr-org-2470 126 9 new new JJ blog-dshr-org-2470 126 10 log log NN blog-dshr-org-2470 126 11 entries entry NNS blog-dshr-org-2470 126 12 of of IN blog-dshr-org-2470 126 13 the the DT blog-dshr-org-2470 126 14 witnessing witness VBG blog-dshr-org-2470 126 15 log log NN blog-dshr-org-2470 126 16 that that WDT blog-dshr-org-2470 126 17 are be VBP blog-dshr-org-2470 126 18 tree tree NN blog-dshr-org-2470 126 19 roots root NNS blog-dshr-org-2470 126 20 of of IN blog-dshr-org-2470 126 21 the the DT blog-dshr-org-2470 126 22 committing commit VBG blog-dshr-org-2470 126 23 log log NN blog-dshr-org-2470 126 24 . . . blog-dshr-org-2470 127 1 The the DT blog-dshr-org-2470 127 2 monitor monitor NN blog-dshr-org-2470 127 3 verifies verify VBZ blog-dshr-org-2470 127 4 that that IN blog-dshr-org-2470 127 5 they -PRON- PRP blog-dshr-org-2470 127 6 are be VBP blog-dshr-org-2470 127 7 all all DT blog-dshr-org-2470 127 8 valid valid JJ blog-dshr-org-2470 127 9 extensions extension NNS blog-dshr-org-2470 127 10 of of IN blog-dshr-org-2470 127 11 the the DT blog-dshr-org-2470 127 12 committing commit VBG blog-dshr-org-2470 127 13 log log NN blog-dshr-org-2470 127 14 's 's POS blog-dshr-org-2470 127 15 tree tree NN blog-dshr-org-2470 127 16 history history NN blog-dshr-org-2470 127 17 . . . blog-dshr-org-2470 128 1 Reproducible Reproducible NNP blog-dshr-org-2470 128 2 Builds Builds NNP blog-dshr-org-2470 128 3 One one CD blog-dshr-org-2470 128 4 weakness weakness NN blog-dshr-org-2470 128 5 in in IN blog-dshr-org-2470 128 6 Hof Hof NNP blog-dshr-org-2470 128 7 and and CC blog-dshr-org-2470 128 8 Carle Carle NNP blog-dshr-org-2470 128 9 's 's POS blog-dshr-org-2470 128 10 actual actual JJ blog-dshr-org-2470 128 11 implementation implementation NN blog-dshr-org-2470 128 12 is be VBZ blog-dshr-org-2470 128 13 in in IN blog-dshr-org-2470 128 14 the the DT blog-dshr-org-2470 128 15 connection connection NN blog-dshr-org-2470 128 16 between between IN blog-dshr-org-2470 128 17 the the DT blog-dshr-org-2470 128 18 signed sign VBN blog-dshr-org-2470 128 19 package package NN blog-dshr-org-2470 128 20 of of IN blog-dshr-org-2470 128 21 source source NN blog-dshr-org-2470 128 22 and and CC blog-dshr-org-2470 128 23 the the DT blog-dshr-org-2470 128 24 hashes hash NNS blog-dshr-org-2470 128 25 of of IN blog-dshr-org-2470 128 26 the the DT blog-dshr-org-2470 128 27 result result NN blog-dshr-org-2470 128 28 of of IN blog-dshr-org-2470 128 29 compiling compile VBG blog-dshr-org-2470 128 30 it -PRON- PRP blog-dshr-org-2470 128 31 . . . blog-dshr-org-2470 129 1 It -PRON- PRP blog-dshr-org-2470 129 2 is be VBZ blog-dshr-org-2470 129 3 in in IN blog-dshr-org-2470 129 4 general general JJ blog-dshr-org-2470 129 5 impossible impossible JJ blog-dshr-org-2470 129 6 to to TO blog-dshr-org-2470 129 7 verify verify VB blog-dshr-org-2470 129 8 that that IN blog-dshr-org-2470 129 9 the the DT blog-dshr-org-2470 129 10 binaries binary NNS blog-dshr-org-2470 129 11 are be VBP blog-dshr-org-2470 129 12 the the DT blog-dshr-org-2470 129 13 result result NN blog-dshr-org-2470 129 14 of of IN blog-dshr-org-2470 129 15 compiling compile VBG blog-dshr-org-2470 129 16 the the DT blog-dshr-org-2470 129 17 source source NN blog-dshr-org-2470 129 18 . . . blog-dshr-org-2470 130 1 In in IN blog-dshr-org-2470 130 2 many many JJ blog-dshr-org-2470 130 3 cases case NNS blog-dshr-org-2470 130 4 , , , blog-dshr-org-2470 130 5 even even RB blog-dshr-org-2470 130 6 if if IN blog-dshr-org-2470 130 7 the the DT blog-dshr-org-2470 130 8 source source NN blog-dshr-org-2470 130 9 is be VBZ blog-dshr-org-2470 130 10 re re VBN blog-dshr-org-2470 130 11 - - VBN blog-dshr-org-2470 130 12 compiled compile VBN blog-dshr-org-2470 130 13 in in IN blog-dshr-org-2470 130 14 the the DT blog-dshr-org-2470 130 15 same same JJ blog-dshr-org-2470 130 16 environment environment NN blog-dshr-org-2470 130 17 the the DT blog-dshr-org-2470 130 18 resulting result VBG blog-dshr-org-2470 130 19 binaries binary NNS blog-dshr-org-2470 130 20 will will MD blog-dshr-org-2470 130 21 not not RB blog-dshr-org-2470 130 22 be be VB blog-dshr-org-2470 130 23 bit bit NN blog-dshr-org-2470 130 24 - - HYPH blog-dshr-org-2470 130 25 for for IN blog-dshr-org-2470 130 26 - - HYPH blog-dshr-org-2470 130 27 bit bit NN blog-dshr-org-2470 130 28 identical identical JJ blog-dshr-org-2470 130 29 , , , blog-dshr-org-2470 130 30 and and CC blog-dshr-org-2470 130 31 thus thus RB blog-dshr-org-2470 130 32 their -PRON- PRP$ blog-dshr-org-2470 130 33 hashes hash NNS blog-dshr-org-2470 130 34 will will MD blog-dshr-org-2470 130 35 differ differ VB blog-dshr-org-2470 130 36 . . . blog-dshr-org-2470 131 1 The the DT blog-dshr-org-2470 131 2 differences difference NNS blog-dshr-org-2470 131 3 have have VBP blog-dshr-org-2470 131 4 many many JJ blog-dshr-org-2470 131 5 causes cause NNS blog-dshr-org-2470 131 6 , , , blog-dshr-org-2470 131 7 including include VBG blog-dshr-org-2470 131 8 timestamps timestamp NNS blog-dshr-org-2470 131 9 , , , blog-dshr-org-2470 131 10 randomized randomized JJ blog-dshr-org-2470 131 11 file file NN blog-dshr-org-2470 131 12 names name NNS blog-dshr-org-2470 131 13 , , , blog-dshr-org-2470 131 14 and and CC blog-dshr-org-2470 131 15 so so RB blog-dshr-org-2470 131 16 on on RB blog-dshr-org-2470 131 17 . . . blog-dshr-org-2470 132 1 Of of RB blog-dshr-org-2470 132 2 course course RB blog-dshr-org-2470 132 3 , , , blog-dshr-org-2470 132 4 changes change NNS blog-dshr-org-2470 132 5 in in IN blog-dshr-org-2470 132 6 the the DT blog-dshr-org-2470 132 7 build build NN blog-dshr-org-2470 132 8 environment environment NN blog-dshr-org-2470 132 9 can can MD blog-dshr-org-2470 132 10 also also RB blog-dshr-org-2470 132 11 introduce introduce VB blog-dshr-org-2470 132 12 differences difference NNS blog-dshr-org-2470 132 13 . . . blog-dshr-org-2470 133 1 To to TO blog-dshr-org-2470 133 2 enable enable VB blog-dshr-org-2470 133 3 binaries binary NNS blog-dshr-org-2470 133 4 to to TO blog-dshr-org-2470 133 5 be be VB blog-dshr-org-2470 133 6 securely securely RB blog-dshr-org-2470 133 7 connected connect VBN blog-dshr-org-2470 133 8 to to IN blog-dshr-org-2470 133 9 their -PRON- PRP$ blog-dshr-org-2470 133 10 source source NN blog-dshr-org-2470 133 11 , , , blog-dshr-org-2470 133 12 a a DT blog-dshr-org-2470 133 13 Reproducible Reproducible NNP blog-dshr-org-2470 133 14 Builds Builds NNP blog-dshr-org-2470 133 15 effort effort NN blog-dshr-org-2470 133 16 has have VBZ blog-dshr-org-2470 133 17 been be VBN blog-dshr-org-2470 133 18 under under IN blog-dshr-org-2470 133 19 way way NN blog-dshr-org-2470 133 20 for for IN blog-dshr-org-2470 133 21 more more JJR blog-dshr-org-2470 133 22 than than IN blog-dshr-org-2470 133 23 5 5 CD blog-dshr-org-2470 133 24 years year NNS blog-dshr-org-2470 133 25 . . . blog-dshr-org-2470 134 1 Debian debian JJ blog-dshr-org-2470 134 2 project project NN blog-dshr-org-2470 134 3 lead lead VBP blog-dshr-org-2470 134 4 Chris Chris NNP blog-dshr-org-2470 134 5 Lamb Lamb NNP blog-dshr-org-2470 134 6 's 's POS blog-dshr-org-2470 134 7 45-minute 45-minute CD blog-dshr-org-2470 134 8 talk talk NN blog-dshr-org-2470 134 9 Think think VBP blog-dshr-org-2470 134 10 you -PRON- PRP blog-dshr-org-2470 134 11 're be VBP blog-dshr-org-2470 134 12 not not RB blog-dshr-org-2470 134 13 a a DT blog-dshr-org-2470 134 14 target target NN blog-dshr-org-2470 134 15 ? ? . blog-dshr-org-2470 135 1 A a DT blog-dshr-org-2470 135 2 tale tale NN blog-dshr-org-2470 135 3 of of IN blog-dshr-org-2470 135 4 3 3 CD blog-dshr-org-2470 135 5 developers developer NNS blog-dshr-org-2470 135 6 ... ... NFP blog-dshr-org-2470 135 7 provides provide VBZ blog-dshr-org-2470 135 8 an an DT blog-dshr-org-2470 135 9 overview overview NN blog-dshr-org-2470 135 10 of of IN blog-dshr-org-2470 135 11 the the DT blog-dshr-org-2470 135 12 problem problem NN blog-dshr-org-2470 135 13 and and CC blog-dshr-org-2470 135 14 the the DT blog-dshr-org-2470 135 15 work work NN blog-dshr-org-2470 135 16 to to TO blog-dshr-org-2470 135 17 solve solve VB blog-dshr-org-2470 135 18 it -PRON- PRP blog-dshr-org-2470 135 19 using use VBG blog-dshr-org-2470 135 20 three three CD blog-dshr-org-2470 135 21 example example NN blog-dshr-org-2470 135 22 compromises compromise NNS blog-dshr-org-2470 135 23 : : : blog-dshr-org-2470 135 24 Alice Alice NNP blog-dshr-org-2470 135 25 , , , blog-dshr-org-2470 135 26 a a DT blog-dshr-org-2470 135 27 package package NN blog-dshr-org-2470 135 28 developer developer NN blog-dshr-org-2470 135 29 who who WP blog-dshr-org-2470 135 30 is be VBZ blog-dshr-org-2470 135 31 blackmailed blackmail VBN blog-dshr-org-2470 135 32 to to TO blog-dshr-org-2470 135 33 distribute distribute VB blog-dshr-org-2470 135 34 binaries binary NNS blog-dshr-org-2470 135 35 that that WDT blog-dshr-org-2470 135 36 do do VBP blog-dshr-org-2470 135 37 n't not RB blog-dshr-org-2470 135 38 match match VB blog-dshr-org-2470 135 39 the the DT blog-dshr-org-2470 135 40 public public JJ blog-dshr-org-2470 135 41 source source NN blog-dshr-org-2470 135 42 . . . blog-dshr-org-2470 136 1 Bob Bob NNP blog-dshr-org-2470 136 2 , , , blog-dshr-org-2470 136 3 a a DT blog-dshr-org-2470 136 4 build build NN blog-dshr-org-2470 136 5 farm farm NN blog-dshr-org-2470 136 6 sysadmin sysadmin NN blog-dshr-org-2470 136 7 whose whose WP$ blog-dshr-org-2470 136 8 personal personal JJ blog-dshr-org-2470 136 9 computer computer NN blog-dshr-org-2470 136 10 has have VBZ blog-dshr-org-2470 136 11 been be VBN blog-dshr-org-2470 136 12 compromised compromise VBN blog-dshr-org-2470 136 13 , , , blog-dshr-org-2470 136 14 leading lead VBG blog-dshr-org-2470 136 15 to to IN blog-dshr-org-2470 136 16 a a DT blog-dshr-org-2470 136 17 compromised compromised JJ blog-dshr-org-2470 136 18 build build NN blog-dshr-org-2470 136 19 toolchain toolchain NN blog-dshr-org-2470 136 20 in in IN blog-dshr-org-2470 136 21 the the DT blog-dshr-org-2470 136 22 build build JJ blog-dshr-org-2470 136 23 farm farm NN blog-dshr-org-2470 136 24 that that WDT blog-dshr-org-2470 136 25 inserts insert VBZ blog-dshr-org-2470 136 26 backdoors backdoor NNS blog-dshr-org-2470 136 27 into into IN blog-dshr-org-2470 136 28 the the DT blog-dshr-org-2470 136 29 binaries binary NNS blog-dshr-org-2470 136 30 . . . blog-dshr-org-2470 137 1 Carol Carol NNP blog-dshr-org-2470 137 2 , , , blog-dshr-org-2470 137 3 a a DT blog-dshr-org-2470 137 4 free free JJ blog-dshr-org-2470 137 5 software software NN blog-dshr-org-2470 137 6 enthusiast enthusiast NN blog-dshr-org-2470 137 7 who who WP blog-dshr-org-2470 137 8 distributes distribute VBZ blog-dshr-org-2470 137 9 binaries binary NNS blog-dshr-org-2470 137 10 to to IN blog-dshr-org-2470 137 11 friends friend NNS blog-dshr-org-2470 137 12 . . . blog-dshr-org-2470 138 1 An an DT blog-dshr-org-2470 138 2 evil evil JJ blog-dshr-org-2470 138 3 maid maid NN blog-dshr-org-2470 138 4 attack attack NN blog-dshr-org-2470 138 5 has have VBZ blog-dshr-org-2470 138 6 compromised compromise VBN blog-dshr-org-2470 138 7 her -PRON- PRP$ blog-dshr-org-2470 138 8 laptop laptop NN blog-dshr-org-2470 138 9 . . . blog-dshr-org-2470 139 1 As as IN blog-dshr-org-2470 139 2 Lamb Lamb NNP blog-dshr-org-2470 139 3 describes describe VBZ blog-dshr-org-2470 139 4 , , , blog-dshr-org-2470 139 5 eliminating eliminate VBG blog-dshr-org-2470 139 6 all all DT blog-dshr-org-2470 139 7 sources source NNS blog-dshr-org-2470 139 8 of of IN blog-dshr-org-2470 139 9 irreproducibility irreproducibility NN blog-dshr-org-2470 139 10 from from IN blog-dshr-org-2470 139 11 a a DT blog-dshr-org-2470 139 12 package package NN blog-dshr-org-2470 139 13 is be VBZ blog-dshr-org-2470 139 14 a a DT blog-dshr-org-2470 139 15 painstaking painstaking JJ blog-dshr-org-2470 139 16 process process NN blog-dshr-org-2470 139 17 because because IN blog-dshr-org-2470 139 18 there there EX blog-dshr-org-2470 139 19 are be VBP blog-dshr-org-2470 139 20 so so RB blog-dshr-org-2470 139 21 many many JJ blog-dshr-org-2470 139 22 possibilities possibility NNS blog-dshr-org-2470 139 23 . . . blog-dshr-org-2470 140 1 They -PRON- PRP blog-dshr-org-2470 140 2 include include VBP blog-dshr-org-2470 140 3 non non JJ blog-dshr-org-2470 140 4 - - JJ blog-dshr-org-2470 140 5 deterministic deterministic JJ blog-dshr-org-2470 140 6 behaviors behavior NNS blog-dshr-org-2470 140 7 such such JJ blog-dshr-org-2470 140 8 as as IN blog-dshr-org-2470 140 9 iterating iterate VBG blog-dshr-org-2470 140 10 over over RP blog-dshr-org-2470 140 11 hashmaps hashmaps RB blog-dshr-org-2470 140 12 , , , blog-dshr-org-2470 140 13 parallel parallel JJ blog-dshr-org-2470 140 14 builds build NNS blog-dshr-org-2470 140 15 , , , blog-dshr-org-2470 140 16 timestamps timestamp NNS blog-dshr-org-2470 140 17 , , , blog-dshr-org-2470 140 18 build build VB blog-dshr-org-2470 140 19 paths path NNS blog-dshr-org-2470 140 20 , , , blog-dshr-org-2470 140 21 file file NN blog-dshr-org-2470 140 22 system system NN blog-dshr-org-2470 140 23 directory directory NN blog-dshr-org-2470 140 24 name name NN blog-dshr-org-2470 140 25 order order NN blog-dshr-org-2470 140 26 , , , blog-dshr-org-2470 140 27 and and CC blog-dshr-org-2470 140 28 so so RB blog-dshr-org-2470 140 29 on on RB blog-dshr-org-2470 140 30 . . . blog-dshr-org-2470 141 1 The the DT blog-dshr-org-2470 141 2 work work NN blog-dshr-org-2470 141 3 started start VBD blog-dshr-org-2470 141 4 in in IN blog-dshr-org-2470 141 5 2013 2013 CD blog-dshr-org-2470 141 6 with with IN blog-dshr-org-2470 141 7 24 24 CD blog-dshr-org-2470 141 8 % % NN blog-dshr-org-2470 141 9 of of IN blog-dshr-org-2470 141 10 Debian debian JJ blog-dshr-org-2470 141 11 packages package NNS blog-dshr-org-2470 141 12 building build VBG blog-dshr-org-2470 141 13 reproducibly reproducibly RB blog-dshr-org-2470 141 14 . . . blog-dshr-org-2470 142 1 Currently currently RB blog-dshr-org-2470 142 2 , , , blog-dshr-org-2470 142 3 over over IN blog-dshr-org-2470 142 4 90 90 CD blog-dshr-org-2470 142 5 % % NN blog-dshr-org-2470 142 6 of of IN blog-dshr-org-2470 142 7 the the DT blog-dshr-org-2470 142 8 Debian debian JJ blog-dshr-org-2470 142 9 packages package NNS blog-dshr-org-2470 142 10 are be VBP blog-dshr-org-2470 142 11 now now RB blog-dshr-org-2470 142 12 reproducible reproducible JJ blog-dshr-org-2470 142 13 . . . blog-dshr-org-2470 143 1 That that DT blog-dshr-org-2470 143 2 is be VBZ blog-dshr-org-2470 143 3 good good JJ blog-dshr-org-2470 143 4 , , , blog-dshr-org-2470 143 5 but but CC blog-dshr-org-2470 143 6 100 100 CD blog-dshr-org-2470 143 7 % % NN blog-dshr-org-2470 143 8 coverage coverage NN blog-dshr-org-2470 143 9 is be VBZ blog-dshr-org-2470 143 10 really really RB blog-dshr-org-2470 143 11 necessary necessary JJ blog-dshr-org-2470 143 12 to to TO blog-dshr-org-2470 143 13 provide provide VB blog-dshr-org-2470 143 14 security security NN blog-dshr-org-2470 143 15 . . . blog-dshr-org-2470 144 1 Bootstrappable Bootstrappable NNP blog-dshr-org-2470 144 2 Compilers Compilers NNP blog-dshr-org-2470 144 3 One one CD blog-dshr-org-2470 144 4 of of IN blog-dshr-org-2470 144 5 the the DT blog-dshr-org-2470 144 6 most most RBS blog-dshr-org-2470 144 7 famous famous JJ blog-dshr-org-2470 144 8 of of IN blog-dshr-org-2470 144 9 the the DT blog-dshr-org-2470 144 10 ACM ACM NNP blog-dshr-org-2470 144 11 's 's POS blog-dshr-org-2470 144 12 annual annual JJ blog-dshr-org-2470 144 13 Turing Turing NNP blog-dshr-org-2470 144 14 Award Award NNP blog-dshr-org-2470 144 15 lectures lecture NNS blog-dshr-org-2470 144 16 was be VBD blog-dshr-org-2470 144 17 Ken Ken NNP blog-dshr-org-2470 144 18 Thompson Thompson NNP blog-dshr-org-2470 144 19 's 's POS blog-dshr-org-2470 144 20 1984 1984 CD blog-dshr-org-2470 144 21 Reflections Reflections NNPS blog-dshr-org-2470 144 22 On on IN blog-dshr-org-2470 144 23 Trusting Trusting NNP blog-dshr-org-2470 144 24 Trust Trust NNP blog-dshr-org-2470 144 25 ( ( -LRB- blog-dshr-org-2470 144 26 also also RB blog-dshr-org-2470 144 27 here here RB blog-dshr-org-2470 144 28 ) ) -RRB- blog-dshr-org-2470 144 29 . . . blog-dshr-org-2470 145 1 In in IN blog-dshr-org-2470 145 2 2006 2006 CD blog-dshr-org-2470 145 3 , , , blog-dshr-org-2470 145 4 Bruce Bruce NNP blog-dshr-org-2470 145 5 Schneier Schneier NNP blog-dshr-org-2470 145 6 summarized summarize VBD blog-dshr-org-2470 145 7 its -PRON- PRP$ blog-dshr-org-2470 145 8 message message NN blog-dshr-org-2470 145 9 thus thus RB blog-dshr-org-2470 145 10 : : : blog-dshr-org-2470 145 11 Way way NN blog-dshr-org-2470 145 12 back back RB blog-dshr-org-2470 145 13 in in IN blog-dshr-org-2470 145 14 1974 1974 CD blog-dshr-org-2470 145 15 , , , blog-dshr-org-2470 145 16 Paul Paul NNP blog-dshr-org-2470 145 17 Karger Karger NNP blog-dshr-org-2470 145 18 and and CC blog-dshr-org-2470 145 19 Roger Roger NNP blog-dshr-org-2470 145 20 Schell Schell NNP blog-dshr-org-2470 145 21 discovered discover VBD blog-dshr-org-2470 145 22 a a DT blog-dshr-org-2470 145 23 devastating devastating JJ blog-dshr-org-2470 145 24 attack attack NN blog-dshr-org-2470 145 25 against against IN blog-dshr-org-2470 145 26 computer computer NN blog-dshr-org-2470 145 27 systems system NNS blog-dshr-org-2470 145 28 . . . blog-dshr-org-2470 146 1 Ken Ken NNP blog-dshr-org-2470 146 2 Thompson Thompson NNP blog-dshr-org-2470 146 3 described describe VBD blog-dshr-org-2470 146 4 it -PRON- PRP blog-dshr-org-2470 146 5 in in IN blog-dshr-org-2470 146 6 his -PRON- PRP$ blog-dshr-org-2470 146 7 classic classic JJ blog-dshr-org-2470 146 8 1984 1984 CD blog-dshr-org-2470 146 9 speech speech NN blog-dshr-org-2470 146 10 , , , blog-dshr-org-2470 146 11 " " `` blog-dshr-org-2470 146 12 Reflections reflection NNS blog-dshr-org-2470 146 13 on on IN blog-dshr-org-2470 146 14 Trusting Trusting NNP blog-dshr-org-2470 146 15 Trust Trust NNP blog-dshr-org-2470 146 16 . . . blog-dshr-org-2470 146 17 " " '' blog-dshr-org-2470 147 1 Basically basically RB blog-dshr-org-2470 147 2 , , , blog-dshr-org-2470 147 3 an an DT blog-dshr-org-2470 147 4 attacker attacker NN blog-dshr-org-2470 147 5 changes change VBZ blog-dshr-org-2470 147 6 a a DT blog-dshr-org-2470 147 7 compiler compiler NN blog-dshr-org-2470 147 8 binary binary JJ blog-dshr-org-2470 147 9 to to TO blog-dshr-org-2470 147 10 produce produce VB blog-dshr-org-2470 147 11 malicious malicious JJ blog-dshr-org-2470 147 12 versions version NNS blog-dshr-org-2470 147 13 of of IN blog-dshr-org-2470 147 14 some some DT blog-dshr-org-2470 147 15 programs program NNS blog-dshr-org-2470 147 16 , , , blog-dshr-org-2470 147 17 INCLUDING including RB blog-dshr-org-2470 147 18 ITSELF ITSELF NNP blog-dshr-org-2470 147 19 . . . blog-dshr-org-2470 148 1 Once once IN blog-dshr-org-2470 148 2 this this DT blog-dshr-org-2470 148 3 is be VBZ blog-dshr-org-2470 148 4 done do VBN blog-dshr-org-2470 148 5 , , , blog-dshr-org-2470 148 6 the the DT blog-dshr-org-2470 148 7 attack attack NN blog-dshr-org-2470 148 8 perpetuates perpetuate NNS blog-dshr-org-2470 148 9 , , , blog-dshr-org-2470 148 10 essentially essentially RB blog-dshr-org-2470 148 11 undetectably undetectably RB blog-dshr-org-2470 148 12 . . . blog-dshr-org-2470 149 1 Thompson Thompson NNP blog-dshr-org-2470 149 2 demonstrated demonstrate VBD blog-dshr-org-2470 149 3 the the DT blog-dshr-org-2470 149 4 attack attack NN blog-dshr-org-2470 149 5 in in IN blog-dshr-org-2470 149 6 a a DT blog-dshr-org-2470 149 7 devastating devastating JJ blog-dshr-org-2470 149 8 way way NN blog-dshr-org-2470 149 9 : : : blog-dshr-org-2470 149 10 he -PRON- PRP blog-dshr-org-2470 149 11 subverted subvert VBD blog-dshr-org-2470 149 12 a a DT blog-dshr-org-2470 149 13 compiler compiler NN blog-dshr-org-2470 149 14 of of IN blog-dshr-org-2470 149 15 an an DT blog-dshr-org-2470 149 16 experimental experimental JJ blog-dshr-org-2470 149 17 victim victim NN blog-dshr-org-2470 149 18 , , , blog-dshr-org-2470 149 19 allowing allow VBG blog-dshr-org-2470 149 20 Thompson Thompson NNP blog-dshr-org-2470 149 21 to to TO blog-dshr-org-2470 149 22 log log VB blog-dshr-org-2470 149 23 in in RP blog-dshr-org-2470 149 24 as as IN blog-dshr-org-2470 149 25 root root NN blog-dshr-org-2470 149 26 without without IN blog-dshr-org-2470 149 27 using use VBG blog-dshr-org-2470 149 28 a a DT blog-dshr-org-2470 149 29 password password NN blog-dshr-org-2470 149 30 . . . blog-dshr-org-2470 150 1 The the DT blog-dshr-org-2470 150 2 victim victim NN blog-dshr-org-2470 150 3 never never RB blog-dshr-org-2470 150 4 noticed notice VBD blog-dshr-org-2470 150 5 the the DT blog-dshr-org-2470 150 6 attack attack NN blog-dshr-org-2470 150 7 , , , blog-dshr-org-2470 150 8 even even RB blog-dshr-org-2470 150 9 when when WRB blog-dshr-org-2470 150 10 they -PRON- PRP blog-dshr-org-2470 150 11 disassembled disassemble VBD blog-dshr-org-2470 150 12 the the DT blog-dshr-org-2470 150 13 binaries binary NNS blog-dshr-org-2470 150 14 -- -- : blog-dshr-org-2470 150 15 the the DT blog-dshr-org-2470 150 16 compiler compiler NN blog-dshr-org-2470 150 17 rigged rig VBD blog-dshr-org-2470 150 18 the the DT blog-dshr-org-2470 150 19 disassembler disassembler NN blog-dshr-org-2470 150 20 , , , blog-dshr-org-2470 150 21 too too RB blog-dshr-org-2470 150 22 . . . blog-dshr-org-2470 151 1 Schneier Schneier NNP blog-dshr-org-2470 151 2 was be VBD blog-dshr-org-2470 151 3 discussing discuss VBG blog-dshr-org-2470 151 4 David David NNP blog-dshr-org-2470 151 5 A. A. NNP blog-dshr-org-2470 151 6 Wheeler Wheeler NNP blog-dshr-org-2470 151 7 's 's POS blog-dshr-org-2470 151 8 Countering Countering NNP blog-dshr-org-2470 151 9 Trusting Trusting NNP blog-dshr-org-2470 151 10 Trust Trust NNP blog-dshr-org-2470 151 11 through through IN blog-dshr-org-2470 151 12 Diverse Diverse NNP blog-dshr-org-2470 151 13 Double double NN blog-dshr-org-2470 151 14 - - HYPH blog-dshr-org-2470 151 15 Compiling compiling JJ blog-dshr-org-2470 151 16 . . . blog-dshr-org-2470 152 1 Wheeler Wheeler NNP blog-dshr-org-2470 152 2 's 's POS blog-dshr-org-2470 152 3 subsequent subsequent JJ blog-dshr-org-2470 152 4 work work NN blog-dshr-org-2470 152 5 led lead VBD blog-dshr-org-2470 152 6 to to IN blog-dshr-org-2470 152 7 his -PRON- PRP$ blog-dshr-org-2470 152 8 2009 2009 CD blog-dshr-org-2470 152 9 Ph.D. ph.d. NN blog-dshr-org-2470 152 10 thesis thesis NN blog-dshr-org-2470 152 11 . . . blog-dshr-org-2470 153 1 To to TO blog-dshr-org-2470 153 2 oversimpify oversimpify VB blog-dshr-org-2470 153 3 , , , blog-dshr-org-2470 153 4 his -PRON- PRP$ blog-dshr-org-2470 153 5 technique technique NN blog-dshr-org-2470 153 6 involves involve VBZ blog-dshr-org-2470 153 7 the the DT blog-dshr-org-2470 153 8 suspect suspect JJ blog-dshr-org-2470 153 9 compiler compiler NN blog-dshr-org-2470 153 10 compiling compile VBG blog-dshr-org-2470 153 11 its -PRON- PRP$ blog-dshr-org-2470 153 12 source source NN blog-dshr-org-2470 153 13 twice twice RB blog-dshr-org-2470 153 14 , , , blog-dshr-org-2470 153 15 and and CC blog-dshr-org-2470 153 16 comparing compare VBG blog-dshr-org-2470 153 17 the the DT blog-dshr-org-2470 153 18 output output NN blog-dshr-org-2470 153 19 to to IN blog-dshr-org-2470 153 20 that that DT blog-dshr-org-2470 153 21 from from IN blog-dshr-org-2470 153 22 a a DT blog-dshr-org-2470 153 23 " " `` blog-dshr-org-2470 153 24 trusted trusted JJ blog-dshr-org-2470 153 25 " " '' blog-dshr-org-2470 153 26 compiler compiler NN blog-dshr-org-2470 153 27 compiling compile VBG blog-dshr-org-2470 153 28 the the DT blog-dshr-org-2470 153 29 same same JJ blog-dshr-org-2470 153 30 source source NN blog-dshr-org-2470 153 31 twice twice RB blog-dshr-org-2470 153 32 . . . blog-dshr-org-2470 154 1 He -PRON- PRP blog-dshr-org-2470 154 2 writes write VBZ blog-dshr-org-2470 154 3 : : : blog-dshr-org-2470 154 4 DDC DDC NNP blog-dshr-org-2470 154 5 uses use VBZ blog-dshr-org-2470 154 6 a a DT blog-dshr-org-2470 154 7 second second JJ blog-dshr-org-2470 154 8 “ " `` blog-dshr-org-2470 154 9 trusted trusted JJ blog-dshr-org-2470 154 10 ” " '' blog-dshr-org-2470 154 11 compiler compiler NN blog-dshr-org-2470 154 12 cT cT NNP blog-dshr-org-2470 154 13 , , , blog-dshr-org-2470 154 14 which which WDT blog-dshr-org-2470 154 15 is be VBZ blog-dshr-org-2470 154 16 trusted trust VBN blog-dshr-org-2470 154 17 in in IN blog-dshr-org-2470 154 18 the the DT blog-dshr-org-2470 154 19 sense sense NN blog-dshr-org-2470 154 20 that that IN blog-dshr-org-2470 154 21 we -PRON- PRP blog-dshr-org-2470 154 22 have have VBP blog-dshr-org-2470 154 23 a a DT blog-dshr-org-2470 154 24 justified justified JJ blog-dshr-org-2470 154 25 confidence confidence NN blog-dshr-org-2470 154 26 that that IN blog-dshr-org-2470 154 27 cT cT NNP blog-dshr-org-2470 154 28 does do VBZ blog-dshr-org-2470 154 29 not not RB blog-dshr-org-2470 154 30 have have VB blog-dshr-org-2470 154 31 triggers trigger NNS blog-dshr-org-2470 154 32 or or CC blog-dshr-org-2470 154 33 payloads payload NNS blog-dshr-org-2470 154 34 There there EX blog-dshr-org-2470 154 35 are be VBP blog-dshr-org-2470 154 36 two two CD blog-dshr-org-2470 154 37 issues issue NNS blog-dshr-org-2470 154 38 here here RB blog-dshr-org-2470 154 39 . . . blog-dshr-org-2470 155 1 The the DT blog-dshr-org-2470 155 2 first first JJ blog-dshr-org-2470 155 3 is be VBZ blog-dshr-org-2470 155 4 an an DT blog-dshr-org-2470 155 5 assumption assumption NN blog-dshr-org-2470 155 6 that that IN blog-dshr-org-2470 155 7 the the DT blog-dshr-org-2470 155 8 suspect suspect JJ blog-dshr-org-2470 155 9 compiler compiler NN blog-dshr-org-2470 155 10 's 's POS blog-dshr-org-2470 155 11 build build NN blog-dshr-org-2470 155 12 is be VBZ blog-dshr-org-2470 155 13 reproducible reproducible JJ blog-dshr-org-2470 155 14 . . . blog-dshr-org-2470 156 1 The the DT blog-dshr-org-2470 156 2 second second JJ blog-dshr-org-2470 156 3 is be VBZ blog-dshr-org-2470 156 4 the the DT blog-dshr-org-2470 156 5 issue issue NN blog-dshr-org-2470 156 6 of of IN blog-dshr-org-2470 156 7 where where WRB blog-dshr-org-2470 156 8 the the DT blog-dshr-org-2470 156 9 " " `` blog-dshr-org-2470 156 10 justified justified JJ blog-dshr-org-2470 156 11 confidence confidence NN blog-dshr-org-2470 156 12 " " '' blog-dshr-org-2470 156 13 comes come VBZ blog-dshr-org-2470 156 14 from from IN blog-dshr-org-2470 156 15 . . . blog-dshr-org-2470 157 1 This this DT blog-dshr-org-2470 157 2 is be VBZ blog-dshr-org-2470 157 3 the the DT blog-dshr-org-2470 157 4 motivation motivation NN blog-dshr-org-2470 157 5 for for IN blog-dshr-org-2470 157 6 the the DT blog-dshr-org-2470 157 7 Bootstrappable Bootstrappable NNP blog-dshr-org-2470 157 8 Builds Builds NNPS blog-dshr-org-2470 157 9 project project NN blog-dshr-org-2470 157 10 , , , blog-dshr-org-2470 157 11 whose whose WP$ blog-dshr-org-2470 157 12 goal goal NN blog-dshr-org-2470 157 13 is be VBZ blog-dshr-org-2470 157 14 to to TO blog-dshr-org-2470 157 15 create create VB blog-dshr-org-2470 157 16 a a DT blog-dshr-org-2470 157 17 process process NN blog-dshr-org-2470 157 18 for for IN blog-dshr-org-2470 157 19 building build VBG blog-dshr-org-2470 157 20 a a DT blog-dshr-org-2470 157 21 complete complete JJ blog-dshr-org-2470 157 22 toolchain toolchain NN blog-dshr-org-2470 157 23 starting start VBG blog-dshr-org-2470 157 24 from from IN blog-dshr-org-2470 157 25 a a DT blog-dshr-org-2470 157 26 " " `` blog-dshr-org-2470 157 27 seed seed NN blog-dshr-org-2470 157 28 " " '' blog-dshr-org-2470 157 29 binary binary NN blog-dshr-org-2470 157 30 that that WDT blog-dshr-org-2470 157 31 is be VBZ blog-dshr-org-2470 157 32 simple simple JJ blog-dshr-org-2470 157 33 enough enough RB blog-dshr-org-2470 157 34 to to TO blog-dshr-org-2470 157 35 be be VB blog-dshr-org-2470 157 36 certified certify VBN blog-dshr-org-2470 157 37 " " '' blog-dshr-org-2470 157 38 by by IN blog-dshr-org-2470 157 39 inspection inspection NN blog-dshr-org-2470 157 40 " " '' blog-dshr-org-2470 157 41 . . . blog-dshr-org-2470 158 1 One one CD blog-dshr-org-2470 158 2 sub sub NN blog-dshr-org-2470 158 3 - - HYPH blog-dshr-org-2470 158 4 project project NN blog-dshr-org-2470 158 5 is be VBZ blog-dshr-org-2470 158 6 Stage0 stage0 JJ blog-dshr-org-2470 158 7 : : : blog-dshr-org-2470 158 8 Stage0 stage0 VB blog-dshr-org-2470 158 9 starts start VBZ blog-dshr-org-2470 158 10 with with IN blog-dshr-org-2470 158 11 just just RB blog-dshr-org-2470 158 12 a a DT blog-dshr-org-2470 158 13 280byte 280byte NNP blog-dshr-org-2470 158 14 Hex Hex NNP blog-dshr-org-2470 158 15 monitor monitor NN blog-dshr-org-2470 158 16 and and CC blog-dshr-org-2470 158 17 builds build VBZ blog-dshr-org-2470 158 18 up up RP blog-dshr-org-2470 158 19 the the DT blog-dshr-org-2470 158 20 infrastructure infrastructure NN blog-dshr-org-2470 158 21 required require VBN blog-dshr-org-2470 158 22 to to TO blog-dshr-org-2470 158 23 start start VB blog-dshr-org-2470 158 24 some some DT blog-dshr-org-2470 158 25 serious serious JJ blog-dshr-org-2470 158 26 software software NN blog-dshr-org-2470 158 27 development development NN blog-dshr-org-2470 158 28 . . . blog-dshr-org-2470 159 1 With with IN blog-dshr-org-2470 159 2 zero zero CD blog-dshr-org-2470 159 3 external external JJ blog-dshr-org-2470 159 4 dependencies dependency NNS blog-dshr-org-2470 159 5 , , , blog-dshr-org-2470 159 6 with with IN blog-dshr-org-2470 159 7 the the DT blog-dshr-org-2470 159 8 most most RBS blog-dshr-org-2470 159 9 painful painful JJ blog-dshr-org-2470 159 10 work work NN blog-dshr-org-2470 159 11 already already RB blog-dshr-org-2470 159 12 done do VBN blog-dshr-org-2470 159 13 and and CC blog-dshr-org-2470 159 14 real real JJ blog-dshr-org-2470 159 15 langauges langauge NNS blog-dshr-org-2470 159 16 such such JJ blog-dshr-org-2470 159 17 as as IN blog-dshr-org-2470 159 18 assembly assembly NN blog-dshr-org-2470 159 19 , , , blog-dshr-org-2470 159 20 forth forth RB blog-dshr-org-2470 159 21 and and CC blog-dshr-org-2470 159 22 garbage garbage NN blog-dshr-org-2470 159 23 collected collect VBN blog-dshr-org-2470 159 24 lisp lisp NNS blog-dshr-org-2470 159 25 already already RB blog-dshr-org-2470 159 26 implemented implement VBD blog-dshr-org-2470 159 27 The the DT blog-dshr-org-2470 159 28 current current JJ blog-dshr-org-2470 159 29 0.2.0 0.2.0 NN blog-dshr-org-2470 159 30 release release NN blog-dshr-org-2470 159 31 of of IN blog-dshr-org-2470 159 32 Stage0 Stage0 NNP blog-dshr-org-2470 159 33 : : : blog-dshr-org-2470 159 34 marks mark NNS blog-dshr-org-2470 159 35 the the DT blog-dshr-org-2470 159 36 first first JJ blog-dshr-org-2470 159 37 C C NNP blog-dshr-org-2470 159 38 compiler compiler NN blog-dshr-org-2470 159 39 hand hand NN blog-dshr-org-2470 159 40 written write VBN blog-dshr-org-2470 159 41 in in IN blog-dshr-org-2470 159 42 Assembly Assembly NNP blog-dshr-org-2470 159 43 with with IN blog-dshr-org-2470 159 44 structs struct NNS blog-dshr-org-2470 159 45 , , , blog-dshr-org-2470 159 46 unions union NNS blog-dshr-org-2470 159 47 , , , blog-dshr-org-2470 159 48 inline inline NNP blog-dshr-org-2470 159 49 assembly assembly NN blog-dshr-org-2470 159 50 and and CC blog-dshr-org-2470 159 51 the the DT blog-dshr-org-2470 159 52 ability ability NN blog-dshr-org-2470 159 53 to to TO blog-dshr-org-2470 159 54 self self NN blog-dshr-org-2470 159 55 - - HYPH blog-dshr-org-2470 159 56 host host NN blog-dshr-org-2470 159 57 it -PRON- PRP blog-dshr-org-2470 159 58 's be VBZ blog-dshr-org-2470 159 59 C C NNP blog-dshr-org-2470 159 60 version version NN blog-dshr-org-2470 159 61 , , , blog-dshr-org-2470 159 62 which which WDT blog-dshr-org-2470 159 63 is be VBZ blog-dshr-org-2470 159 64 also also RB blog-dshr-org-2470 159 65 self self NN blog-dshr-org-2470 159 66 - - HYPH blog-dshr-org-2470 159 67 hosting host VBG blog-dshr-org-2470 159 68 There there EX blog-dshr-org-2470 159 69 is be VBZ blog-dshr-org-2470 159 70 clearly clearly RB blog-dshr-org-2470 159 71 a a DT blog-dshr-org-2470 159 72 long long JJ blog-dshr-org-2470 159 73 way way NN blog-dshr-org-2470 159 74 still still RB blog-dshr-org-2470 159 75 to to TO blog-dshr-org-2470 159 76 go go VB blog-dshr-org-2470 159 77 to to IN blog-dshr-org-2470 159 78 a a DT blog-dshr-org-2470 159 79 bootstrapped bootstrappe VBN blog-dshr-org-2470 159 80 full full JJ blog-dshr-org-2470 159 81 toolchain toolchain NN blog-dshr-org-2470 159 82 . . . blog-dshr-org-2470 160 1 A a DT blog-dshr-org-2470 160 2 More more RBR blog-dshr-org-2470 160 3 Secure secure JJ blog-dshr-org-2470 160 4 Software software NN blog-dshr-org-2470 160 5 Supply supply NN blog-dshr-org-2470 160 6 Chain chain NN blog-dshr-org-2470 160 7 A a DT blog-dshr-org-2470 160 8 software software NN blog-dshr-org-2470 160 9 supply supply NN blog-dshr-org-2470 160 10 chain chain NN blog-dshr-org-2470 160 11 based base VBN blog-dshr-org-2470 160 12 on on IN blog-dshr-org-2470 160 13 APT APT NNP blog-dshr-org-2470 160 14 enhanced enhance VBN blog-dshr-org-2470 160 15 with with IN blog-dshr-org-2470 160 16 Hof Hof NNP blog-dshr-org-2470 160 17 and and CC blog-dshr-org-2470 160 18 Carle Carle NNP blog-dshr-org-2470 160 19 's 's POS blog-dshr-org-2470 160 20 transparency transparency NN blog-dshr-org-2470 160 21 layer layer NN blog-dshr-org-2470 160 22 , , , blog-dshr-org-2470 160 23 distributing distribute VBG blog-dshr-org-2470 160 24 packages package NNS blog-dshr-org-2470 160 25 reproducibly reproducibly RB blog-dshr-org-2470 160 26 built build VBN blog-dshr-org-2470 160 27 with with IN blog-dshr-org-2470 160 28 bootstrapped bootstrappe VBN blog-dshr-org-2470 160 29 compilers compiler NNS blog-dshr-org-2470 160 30 , , , blog-dshr-org-2470 160 31 would would MD blog-dshr-org-2470 160 32 be be VB blog-dshr-org-2470 160 33 much much RB blog-dshr-org-2470 160 34 more more RBR blog-dshr-org-2470 160 35 difficult difficult JJ blog-dshr-org-2470 160 36 to to TO blog-dshr-org-2470 160 37 attack attack VB blog-dshr-org-2470 160 38 than than IN blog-dshr-org-2470 160 39 current current JJ blog-dshr-org-2470 160 40 technology technology NN blog-dshr-org-2470 160 41 . . . blog-dshr-org-2470 161 1 Users user NNS blog-dshr-org-2470 161 2 of of IN blog-dshr-org-2470 161 3 the the DT blog-dshr-org-2470 161 4 software software NN blog-dshr-org-2470 161 5 could could MD blog-dshr-org-2470 161 6 have have VB blog-dshr-org-2470 161 7 much much RB blog-dshr-org-2470 161 8 higher high JJR blog-dshr-org-2470 161 9 confidence confidence NN blog-dshr-org-2470 161 10 that that IN blog-dshr-org-2470 161 11 the the DT blog-dshr-org-2470 161 12 binaries binary NNS blog-dshr-org-2470 161 13 they -PRON- PRP blog-dshr-org-2470 161 14 installed instal VBD blog-dshr-org-2470 161 15 had have VBD blog-dshr-org-2470 161 16 been be VBN blog-dshr-org-2470 161 17 built build VBN blog-dshr-org-2470 161 18 from from IN blog-dshr-org-2470 161 19 the the DT blog-dshr-org-2470 161 20 corresponding corresponding JJ blog-dshr-org-2470 161 21 source source NN blog-dshr-org-2470 161 22 , , , blog-dshr-org-2470 161 23 and and CC blog-dshr-org-2470 161 24 that that IN blog-dshr-org-2470 161 25 no no DT blog-dshr-org-2470 161 26 attacker attacker NN blog-dshr-org-2470 161 27 had have VBD blog-dshr-org-2470 161 28 introduced introduce VBN blog-dshr-org-2470 161 29 functionality functionality NN blog-dshr-org-2470 161 30 not not RB blog-dshr-org-2470 161 31 evident evident JJ blog-dshr-org-2470 161 32 in in IN blog-dshr-org-2470 161 33 the the DT blog-dshr-org-2470 161 34 source source NN blog-dshr-org-2470 161 35 . . . blog-dshr-org-2470 162 1 These these DT blog-dshr-org-2470 162 2 checks check NNS blog-dshr-org-2470 162 3 would would MD blog-dshr-org-2470 162 4 take take VB blog-dshr-org-2470 162 5 place place NN blog-dshr-org-2470 162 6 during during IN blog-dshr-org-2470 162 7 software software NN blog-dshr-org-2470 162 8 installation installation NN blog-dshr-org-2470 162 9 or or CC blog-dshr-org-2470 162 10 update update NN blog-dshr-org-2470 162 11 . . . blog-dshr-org-2470 163 1 Users user NNS blog-dshr-org-2470 163 2 would would MD blog-dshr-org-2470 163 3 still still RB blog-dshr-org-2470 163 4 need need VB blog-dshr-org-2470 163 5 to to TO blog-dshr-org-2470 163 6 verify verify VB blog-dshr-org-2470 163 7 that that IN blog-dshr-org-2470 163 8 the the DT blog-dshr-org-2470 163 9 software software NN blog-dshr-org-2470 163 10 had have VBD blog-dshr-org-2470 163 11 not not RB blog-dshr-org-2470 163 12 been be VBN blog-dshr-org-2470 163 13 modified modify VBN blog-dshr-org-2470 163 14 after after IN blog-dshr-org-2470 163 15 installation installation NN blog-dshr-org-2470 163 16 , , , blog-dshr-org-2470 163 17 perhaps perhaps RB blog-dshr-org-2470 163 18 using use VBG blog-dshr-org-2470 163 19 a a DT blog-dshr-org-2470 163 20 tripwire tripwire NN blog-dshr-org-2470 163 21 - - HYPH blog-dshr-org-2470 163 22 like like JJ blog-dshr-org-2470 163 23 mechanism mechanism NN blog-dshr-org-2470 163 24 , , , blog-dshr-org-2470 163 25 But but CC blog-dshr-org-2470 163 26 this this DT blog-dshr-org-2470 163 27 mechanism mechanism NN blog-dshr-org-2470 163 28 would would MD blog-dshr-org-2470 163 29 have have VB blog-dshr-org-2470 163 30 a a DT blog-dshr-org-2470 163 31 trustworthy trustworthy JJ blog-dshr-org-2470 163 32 source source NN blog-dshr-org-2470 163 33 of of IN blog-dshr-org-2470 163 34 the the DT blog-dshr-org-2470 163 35 hashes hash NNS blog-dshr-org-2470 163 36 it -PRON- PRP blog-dshr-org-2470 163 37 needs need VBZ blog-dshr-org-2470 163 38 to to TO blog-dshr-org-2470 163 39 do do VB blog-dshr-org-2470 163 40 its -PRON- PRP$ blog-dshr-org-2470 163 41 job job NN blog-dshr-org-2470 163 42 . . . blog-dshr-org-2470 164 1 Remaining remain VBG blog-dshr-org-2470 164 2 Software software NN blog-dshr-org-2470 164 3 Problems Problems NNPS blog-dshr-org-2470 164 4 Despite despite IN blog-dshr-org-2470 164 5 all all PDT blog-dshr-org-2470 164 6 these these DT blog-dshr-org-2470 164 7 enhancements enhancement NNS blog-dshr-org-2470 164 8 , , , blog-dshr-org-2470 164 9 the the DT blog-dshr-org-2470 164 10 event event NN blog-dshr-org-2470 164 11 - - HYPH blog-dshr-org-2470 164 12 stream stream NN blog-dshr-org-2470 164 13 attack attack NN blog-dshr-org-2470 164 14 would would MD blog-dshr-org-2470 164 15 still still RB blog-dshr-org-2470 164 16 have have VB blog-dshr-org-2470 164 17 succeeded succeed VBN blog-dshr-org-2470 164 18 . . . blog-dshr-org-2470 165 1 The the DT blog-dshr-org-2470 165 2 attackers attacker NNS blog-dshr-org-2470 165 3 targeted target VBD blog-dshr-org-2470 165 4 a a DT blog-dshr-org-2470 165 5 widely widely RB blog-dshr-org-2470 165 6 - - HYPH blog-dshr-org-2470 165 7 used use VBN blog-dshr-org-2470 165 8 , , , blog-dshr-org-2470 165 9 fairly fairly RB blog-dshr-org-2470 165 10 old old JJ blog-dshr-org-2470 165 11 package package NN blog-dshr-org-2470 165 12 that that WDT blog-dshr-org-2470 165 13 was be VBD blog-dshr-org-2470 165 14 still still RB blog-dshr-org-2470 165 15 being be VBG blog-dshr-org-2470 165 16 maintained maintain VBN blog-dshr-org-2470 165 17 by by IN blog-dshr-org-2470 165 18 the the DT blog-dshr-org-2470 165 19 original original JJ blog-dshr-org-2470 165 20 author author NN blog-dshr-org-2470 165 21 , , , blog-dshr-org-2470 165 22 a a DT blog-dshr-org-2470 165 23 volunteer volunteer NN blog-dshr-org-2470 165 24 . . . blog-dshr-org-2470 166 1 They -PRON- PRP blog-dshr-org-2470 166 2 offered offer VBD blog-dshr-org-2470 166 3 to to TO blog-dshr-org-2470 166 4 take take VB blog-dshr-org-2470 166 5 over over RP blog-dshr-org-2470 166 6 what what WP blog-dshr-org-2470 166 7 had have VBD blog-dshr-org-2470 166 8 become become VBN blog-dshr-org-2470 166 9 a a DT blog-dshr-org-2470 166 10 burdensome burdensome JJ blog-dshr-org-2470 166 11 task task NN blog-dshr-org-2470 166 12 , , , blog-dshr-org-2470 166 13 and and CC blog-dshr-org-2470 166 14 the the DT blog-dshr-org-2470 166 15 offer offer NN blog-dshr-org-2470 166 16 was be VBD blog-dshr-org-2470 166 17 accepted accept VBN blog-dshr-org-2470 166 18 . . . blog-dshr-org-2470 167 1 Now now RB blog-dshr-org-2470 167 2 , , , blog-dshr-org-2470 167 3 despite despite IN blog-dshr-org-2470 167 4 the the DT blog-dshr-org-2470 167 5 fact fact NN blog-dshr-org-2470 167 6 that that IN blog-dshr-org-2470 167 7 the the DT blog-dshr-org-2470 167 8 attacker attacker NN blog-dshr-org-2470 167 9 was be VBD blog-dshr-org-2470 167 10 just just RB blog-dshr-org-2470 167 11 an an DT blog-dshr-org-2470 167 12 e e NN blog-dshr-org-2470 167 13 - - NN blog-dshr-org-2470 167 14 mail mail NN blog-dshr-org-2470 167 15 address address NN blog-dshr-org-2470 167 16 , , , blog-dshr-org-2470 167 17 they -PRON- PRP blog-dshr-org-2470 167 18 were be VBD blog-dshr-org-2470 167 19 the the DT blog-dshr-org-2470 167 20 official official JJ blog-dshr-org-2470 167 21 maintainer maintainer NN blog-dshr-org-2470 167 22 of of IN blog-dshr-org-2470 167 23 the the DT blog-dshr-org-2470 167 24 package package NN blog-dshr-org-2470 167 25 and and CC blog-dshr-org-2470 167 26 could could MD blog-dshr-org-2470 167 27 authorize authorize VB blog-dshr-org-2470 167 28 changes change NNS blog-dshr-org-2470 167 29 . . . blog-dshr-org-2470 168 1 Their -PRON- PRP$ blog-dshr-org-2470 168 2 changes change NNS blog-dshr-org-2470 168 3 , , , blog-dshr-org-2470 168 4 being be VBG blog-dshr-org-2470 168 5 authorized authorize VBN blog-dshr-org-2470 168 6 by by IN blog-dshr-org-2470 168 7 the the DT blog-dshr-org-2470 168 8 official official JJ blog-dshr-org-2470 168 9 package package NN blog-dshr-org-2470 168 10 maintainer maintainer NN blog-dshr-org-2470 168 11 , , , blog-dshr-org-2470 168 12 would would MD blog-dshr-org-2470 168 13 pass pass VB blog-dshr-org-2470 168 14 unimpeded unimpeded JJ blog-dshr-org-2470 168 15 through through IN blog-dshr-org-2470 168 16 even even RB blog-dshr-org-2470 168 17 the the DT blog-dshr-org-2470 168 18 enhanced enhanced JJ blog-dshr-org-2470 168 19 supply supply NN blog-dshr-org-2470 168 20 chain chain NN blog-dshr-org-2470 168 21 . . . blog-dshr-org-2470 169 1 First first RB blog-dshr-org-2470 169 2 , , , blog-dshr-org-2470 169 3 it -PRON- PRP blog-dshr-org-2470 169 4 is be VBZ blog-dshr-org-2470 169 5 important important JJ blog-dshr-org-2470 169 6 to to TO blog-dshr-org-2470 169 7 observe observe VB blog-dshr-org-2470 169 8 the the DT blog-dshr-org-2470 169 9 goal goal NN blog-dshr-org-2470 169 10 of of IN blog-dshr-org-2470 169 11 Hof Hof NNP blog-dshr-org-2470 169 12 and and CC blog-dshr-org-2470 169 13 Carle Carle NNP blog-dshr-org-2470 169 14 's 's POS blog-dshr-org-2470 169 15 system system NN blog-dshr-org-2470 169 16 is be VBZ blog-dshr-org-2470 169 17 to to TO blog-dshr-org-2470 169 18 detect detect VB blog-dshr-org-2470 169 19 targeted targeted JJ blog-dshr-org-2470 169 20 attacks attack NNS blog-dshr-org-2470 169 21 , , , blog-dshr-org-2470 169 22 those those DT blog-dshr-org-2470 169 23 delivered deliver VBN blog-dshr-org-2470 169 24 to to IN blog-dshr-org-2470 169 25 a a DT blog-dshr-org-2470 169 26 ( ( -LRB- blog-dshr-org-2470 169 27 typically typically RB blog-dshr-org-2470 169 28 small small JJ blog-dshr-org-2470 169 29 ) ) -RRB- blog-dshr-org-2470 169 30 subset subset NN blog-dshr-org-2470 169 31 of of IN blog-dshr-org-2470 169 32 user user NN blog-dshr-org-2470 169 33 systems system NNS blog-dshr-org-2470 169 34 . . . blog-dshr-org-2470 170 1 The the DT blog-dshr-org-2470 170 2 event event NN blog-dshr-org-2470 170 3 - - HYPH blog-dshr-org-2470 170 4 stream stream NN blog-dshr-org-2470 170 5 attack attack NN blog-dshr-org-2470 170 6 was be VBD blog-dshr-org-2470 170 7 not not RB blog-dshr-org-2470 170 8 targeted target VBN blog-dshr-org-2470 170 9 ; ; : blog-dshr-org-2470 170 10 it -PRON- PRP blog-dshr-org-2470 170 11 was be VBD blog-dshr-org-2470 170 12 delivered deliver VBN blog-dshr-org-2470 170 13 to to IN blog-dshr-org-2470 170 14 all all DT blog-dshr-org-2470 170 15 systems system NNS blog-dshr-org-2470 170 16 updating update VBG blog-dshr-org-2470 170 17 the the DT blog-dshr-org-2470 170 18 package package NN blog-dshr-org-2470 170 19 irrespective irrespective RB blog-dshr-org-2470 170 20 of of IN blog-dshr-org-2470 170 21 whether whether IN blog-dshr-org-2470 170 22 they -PRON- PRP blog-dshr-org-2470 170 23 contained contain VBD blog-dshr-org-2470 170 24 the the DT blog-dshr-org-2470 170 25 wallet wallet NN blog-dshr-org-2470 170 26 to to TO blog-dshr-org-2470 170 27 be be VB blog-dshr-org-2470 170 28 compromised compromise VBN blog-dshr-org-2470 170 29 . . . blog-dshr-org-2470 171 1 That that IN blog-dshr-org-2470 171 2 their -PRON- PRP$ blog-dshr-org-2470 171 3 system system NN blog-dshr-org-2470 171 4 is be VBZ blog-dshr-org-2470 171 5 designed design VBN blog-dshr-org-2470 171 6 only only RB blog-dshr-org-2470 171 7 to to TO blog-dshr-org-2470 171 8 detect detect VB blog-dshr-org-2470 171 9 targeted targeted JJ blog-dshr-org-2470 171 10 attacks attack NNS blog-dshr-org-2470 171 11 seems seem VBZ blog-dshr-org-2470 171 12 to to IN blog-dshr-org-2470 171 13 me -PRON- PRP blog-dshr-org-2470 171 14 to to TO blog-dshr-org-2470 171 15 be be VB blog-dshr-org-2470 171 16 a a DT blog-dshr-org-2470 171 17 significant significant JJ blog-dshr-org-2470 171 18 weakness weakness NN blog-dshr-org-2470 171 19 . . . blog-dshr-org-2470 172 1 It -PRON- PRP blog-dshr-org-2470 172 2 is be VBZ blog-dshr-org-2470 172 3 very very RB blog-dshr-org-2470 172 4 easy easy JJ blog-dshr-org-2470 172 5 to to TO blog-dshr-org-2470 172 6 design design VB blog-dshr-org-2470 172 7 an an DT blog-dshr-org-2470 172 8 attack attack NN blog-dshr-org-2470 172 9 , , , blog-dshr-org-2470 172 10 like like IN blog-dshr-org-2470 172 11 the the DT blog-dshr-org-2470 172 12 event event NN blog-dshr-org-2470 172 13 - - HYPH blog-dshr-org-2470 172 14 stream stream NN blog-dshr-org-2470 172 15 one one NN blog-dshr-org-2470 172 16 , , , blog-dshr-org-2470 172 17 that that WDT blog-dshr-org-2470 172 18 is be VBZ blog-dshr-org-2470 172 19 broadcast broadcast VBN blog-dshr-org-2470 172 20 to to IN blog-dshr-org-2470 172 21 all all DT blog-dshr-org-2470 172 22 systems system NNS blog-dshr-org-2470 172 23 but but CC blog-dshr-org-2470 172 24 is be VBZ blog-dshr-org-2470 172 25 harmless harmless JJ blog-dshr-org-2470 172 26 on on IN blog-dshr-org-2470 172 27 all all DT blog-dshr-org-2470 172 28 but but IN blog-dshr-org-2470 172 29 the the DT blog-dshr-org-2470 172 30 targets target NNS blog-dshr-org-2470 172 31 . . . blog-dshr-org-2470 173 1 Second second JJ blog-dshr-org-2470 173 2 , , , blog-dshr-org-2470 173 3 Hof Hof NNP blog-dshr-org-2470 173 4 and and CC blog-dshr-org-2470 173 5 Carle Carle NNP blog-dshr-org-2470 173 6 's 's POS blog-dshr-org-2470 173 7 system system NN blog-dshr-org-2470 173 8 operates operate VBZ blog-dshr-org-2470 173 9 asynchronously asynchronously RB blog-dshr-org-2470 173 10 , , , blog-dshr-org-2470 173 11 so so RB blog-dshr-org-2470 173 12 is be VBZ blog-dshr-org-2470 173 13 intended intend VBN blog-dshr-org-2470 173 14 to to TO blog-dshr-org-2470 173 15 detect detect VB blog-dshr-org-2470 173 16 rather rather RB blog-dshr-org-2470 173 17 than than IN blog-dshr-org-2470 173 18 prevent prevent VB blog-dshr-org-2470 173 19 victim victim NN blog-dshr-org-2470 173 20 compromise compromise NN blog-dshr-org-2470 173 21 . . . blog-dshr-org-2470 174 1 Of of RB blog-dshr-org-2470 174 2 course course RB blog-dshr-org-2470 174 3 , , , blog-dshr-org-2470 174 4 once once IN blog-dshr-org-2470 174 5 the the DT blog-dshr-org-2470 174 6 attack attack NN blog-dshr-org-2470 174 7 was be VBD blog-dshr-org-2470 174 8 detected detect VBN blog-dshr-org-2470 174 9 it -PRON- PRP blog-dshr-org-2470 174 10 could could MD blog-dshr-org-2470 174 11 be be VB blog-dshr-org-2470 174 12 unambiguously unambiguously RB blog-dshr-org-2470 174 13 attributed attribute VBN blog-dshr-org-2470 174 14 . . . blog-dshr-org-2470 175 1 But but CC blog-dshr-org-2470 175 2 : : : blog-dshr-org-2470 175 3 The the DT blog-dshr-org-2470 175 4 attack attack NN blog-dshr-org-2470 175 5 would would MD blog-dshr-org-2470 175 6 already already RB blog-dshr-org-2470 175 7 have have VB blog-dshr-org-2470 175 8 succeeded succeed VBN blog-dshr-org-2470 175 9 in in IN blog-dshr-org-2470 175 10 purloining purloin VBG blog-dshr-org-2470 175 11 cryptocurrency cryptocurrency NN blog-dshr-org-2470 175 12 from from IN blog-dshr-org-2470 175 13 the the DT blog-dshr-org-2470 175 14 target target NN blog-dshr-org-2470 175 15 wallets wallet NNS blog-dshr-org-2470 175 16 . . . blog-dshr-org-2470 176 1 This this DT blog-dshr-org-2470 176 2 seems seem VBZ blog-dshr-org-2470 176 3 to to IN blog-dshr-org-2470 176 4 me -PRON- PRP blog-dshr-org-2470 176 5 to to TO blog-dshr-org-2470 176 6 be be VB blog-dshr-org-2470 176 7 a a DT blog-dshr-org-2470 176 8 second second JJ blog-dshr-org-2470 176 9 weakness weakness NN blog-dshr-org-2470 176 10 ; ; : blog-dshr-org-2470 176 11 in in IN blog-dshr-org-2470 176 12 many many JJ blog-dshr-org-2470 176 13 cases case NNS blog-dshr-org-2470 176 14 the the DT blog-dshr-org-2470 176 15 malign malign NN blog-dshr-org-2470 176 16 package package NN blog-dshr-org-2470 176 17 would would MD blog-dshr-org-2470 176 18 only only RB blog-dshr-org-2470 176 19 need need VB blog-dshr-org-2470 176 20 to to TO blog-dshr-org-2470 176 21 be be VB blog-dshr-org-2470 176 22 resident resident JJ blog-dshr-org-2470 176 23 on on IN blog-dshr-org-2470 176 24 the the DT blog-dshr-org-2470 176 25 victim victim NN blog-dshr-org-2470 176 26 for for IN blog-dshr-org-2470 176 27 a a DT blog-dshr-org-2470 176 28 short short JJ blog-dshr-org-2470 176 29 time time NN blog-dshr-org-2470 176 30 to to TO blog-dshr-org-2470 176 31 exfiltrate exfiltrate VB blog-dshr-org-2470 176 32 critical critical JJ blog-dshr-org-2470 176 33 data datum NNS blog-dshr-org-2470 176 34 , , , blog-dshr-org-2470 176 35 or or CC blog-dshr-org-2470 176 36 install install VB blog-dshr-org-2470 176 37 further further JJ blog-dshr-org-2470 176 38 malware malware JJ blog-dshr-org-2470 176 39 providing provide VBG blog-dshr-org-2470 176 40 persistence persistence NN blog-dshr-org-2470 176 41 . . . blog-dshr-org-2470 177 1 Strictly strictly RB blog-dshr-org-2470 177 2 speaking speak VBG blog-dshr-org-2470 177 3 , , , blog-dshr-org-2470 177 4 the the DT blog-dshr-org-2470 177 5 attribution attribution NN blog-dshr-org-2470 177 6 would would MD blog-dshr-org-2470 177 7 be be VB blog-dshr-org-2470 177 8 to to IN blog-dshr-org-2470 177 9 a a DT blog-dshr-org-2470 177 10 private private JJ blog-dshr-org-2470 177 11 key key NN blog-dshr-org-2470 177 12 . . . blog-dshr-org-2470 178 1 More more RBR blog-dshr-org-2470 178 2 realistically realistically RB blog-dshr-org-2470 178 3 , , , blog-dshr-org-2470 178 4 it -PRON- PRP blog-dshr-org-2470 178 5 would would MD blog-dshr-org-2470 178 6 be be VB blog-dshr-org-2470 178 7 to to IN blog-dshr-org-2470 178 8 a a DT blog-dshr-org-2470 178 9 key key NN blog-dshr-org-2470 178 10 and and CC blog-dshr-org-2470 178 11 an an DT blog-dshr-org-2470 178 12 e e NN blog-dshr-org-2470 178 13 - - NN blog-dshr-org-2470 178 14 mail mail NN blog-dshr-org-2470 178 15 address address NN blog-dshr-org-2470 178 16 . . . blog-dshr-org-2470 179 1 In in IN blog-dshr-org-2470 179 2 the the DT blog-dshr-org-2470 179 3 case case NN blog-dshr-org-2470 179 4 of of IN blog-dshr-org-2470 179 5 an an DT blog-dshr-org-2470 179 6 attack attack NN blog-dshr-org-2470 179 7 , , , blog-dshr-org-2470 179 8 linking link VBG blog-dshr-org-2470 179 9 these these DT blog-dshr-org-2470 179 10 to to IN blog-dshr-org-2470 179 11 a a DT blog-dshr-org-2470 179 12 human human JJ blog-dshr-org-2470 179 13 malefactor malefactor NN blog-dshr-org-2470 179 14 would would MD blog-dshr-org-2470 179 15 likely likely RB blog-dshr-org-2470 179 16 be be VB blog-dshr-org-2470 179 17 difficult difficult JJ blog-dshr-org-2470 179 18 , , , blog-dshr-org-2470 179 19 leaving leave VBG blog-dshr-org-2470 179 20 the the DT blog-dshr-org-2470 179 21 perpetrators perpetrator NNS blog-dshr-org-2470 179 22 free free JJ blog-dshr-org-2470 179 23 to to TO blog-dshr-org-2470 179 24 mount mount VB blog-dshr-org-2470 179 25 further further JJ blog-dshr-org-2470 179 26 attacks attack NNS blog-dshr-org-2470 179 27 . . . blog-dshr-org-2470 180 1 Even even RB blog-dshr-org-2470 180 2 if if IN blog-dshr-org-2470 180 3 the the DT blog-dshr-org-2470 180 4 maintainer maintainer NN blog-dshr-org-2470 180 5 had have VBD blog-dshr-org-2470 180 6 not not RB blog-dshr-org-2470 180 7 , , , blog-dshr-org-2470 180 8 as as IN blog-dshr-org-2470 180 9 in in IN blog-dshr-org-2470 180 10 the the DT blog-dshr-org-2470 180 11 event event NN blog-dshr-org-2470 180 12 - - HYPH blog-dshr-org-2470 180 13 stream stream NN blog-dshr-org-2470 180 14 attack attack NN blog-dshr-org-2470 180 15 , , , blog-dshr-org-2470 180 16 been be VBN blog-dshr-org-2470 180 17 replaced replace VBN blog-dshr-org-2470 180 18 via via IN blog-dshr-org-2470 180 19 social social JJ blog-dshr-org-2470 180 20 engineering engineering NN blog-dshr-org-2470 180 21 , , , blog-dshr-org-2470 180 22 it -PRON- PRP blog-dshr-org-2470 180 23 is be VBZ blog-dshr-org-2470 180 24 possible possible JJ blog-dshr-org-2470 180 25 that that IN blog-dshr-org-2470 180 26 their -PRON- PRP$ blog-dshr-org-2470 180 27 e e NN blog-dshr-org-2470 180 28 - - NN blog-dshr-org-2470 180 29 mail mail NN blog-dshr-org-2470 180 30 and and CC blog-dshr-org-2470 180 31 private private JJ blog-dshr-org-2470 180 32 key key NN blog-dshr-org-2470 180 33 could could MD blog-dshr-org-2470 180 34 have have VB blog-dshr-org-2470 180 35 been be VBN blog-dshr-org-2470 180 36 compromised compromise VBN blog-dshr-org-2470 180 37 . . . blog-dshr-org-2470 181 1 The the DT blog-dshr-org-2470 181 2 event event NN blog-dshr-org-2470 181 3 - - HYPH blog-dshr-org-2470 181 4 stream stream NN blog-dshr-org-2470 181 5 attack attack NN blog-dshr-org-2470 181 6 can can MD blog-dshr-org-2470 181 7 be be VB blog-dshr-org-2470 181 8 thought think VBN blog-dshr-org-2470 181 9 of of IN blog-dshr-org-2470 181 10 as as IN blog-dshr-org-2470 181 11 the the DT blog-dshr-org-2470 181 12 organization organization NN blog-dshr-org-2470 181 13 - - HYPH blog-dshr-org-2470 181 14 level level NN blog-dshr-org-2470 181 15 analog analog NN blog-dshr-org-2470 181 16 of of IN blog-dshr-org-2470 181 17 a a DT blog-dshr-org-2470 181 18 Sybil Sybil NNP blog-dshr-org-2470 181 19 attack attack NN blog-dshr-org-2470 181 20 on on IN blog-dshr-org-2470 181 21 a a DT blog-dshr-org-2470 181 22 peer peer NN blog-dshr-org-2470 181 23 - - HYPH blog-dshr-org-2470 181 24 to to IN blog-dshr-org-2470 181 25 - - HYPH blog-dshr-org-2470 181 26 peer peer NN blog-dshr-org-2470 181 27 system system NN blog-dshr-org-2470 181 28 . . . blog-dshr-org-2470 182 1 Creating create VBG blog-dshr-org-2470 182 2 an an DT blog-dshr-org-2470 182 3 e e NN blog-dshr-org-2470 182 4 - - NN blog-dshr-org-2470 182 5 mail mail NN blog-dshr-org-2470 182 6 identity identity NN blog-dshr-org-2470 182 7 is be VBZ blog-dshr-org-2470 182 8 almost almost RB blog-dshr-org-2470 182 9 free free JJ blog-dshr-org-2470 182 10 . . . blog-dshr-org-2470 183 1 The the DT blog-dshr-org-2470 183 2 defense defense NN blog-dshr-org-2470 183 3 against against IN blog-dshr-org-2470 183 4 Sybil Sybil NNP blog-dshr-org-2470 183 5 attacks attack NNS blog-dshr-org-2470 183 6 is be VBZ blog-dshr-org-2470 183 7 to to TO blog-dshr-org-2470 183 8 make make VB blog-dshr-org-2470 183 9 maintaining maintain VBG blog-dshr-org-2470 183 10 and and CC blog-dshr-org-2470 183 11 using use VBG blog-dshr-org-2470 183 12 an an DT blog-dshr-org-2470 183 13 identity identity NN blog-dshr-org-2470 183 14 in in IN blog-dshr-org-2470 183 15 the the DT blog-dshr-org-2470 183 16 system system NN blog-dshr-org-2470 183 17 expensive expensive JJ blog-dshr-org-2470 183 18 . . . blog-dshr-org-2470 184 1 As as IN blog-dshr-org-2470 184 2 with with IN blog-dshr-org-2470 184 3 proof proof NN blog-dshr-org-2470 184 4 - - HYPH blog-dshr-org-2470 184 5 of of IN blog-dshr-org-2470 184 6 - - HYPH blog-dshr-org-2470 184 7 work work NN blog-dshr-org-2470 184 8 in in IN blog-dshr-org-2470 184 9 Bitcoin Bitcoin NNP blog-dshr-org-2470 184 10 , , , blog-dshr-org-2470 184 11 the the DT blog-dshr-org-2470 184 12 idea idea NN blog-dshr-org-2470 184 13 is be VBZ blog-dshr-org-2470 184 14 that that IN blog-dshr-org-2470 184 15 the the DT blog-dshr-org-2470 184 16 white white JJ blog-dshr-org-2470 184 17 hats hat NNS blog-dshr-org-2470 184 18 will will MD blog-dshr-org-2470 184 19 spend spend VB blog-dshr-org-2470 184 20 more more JJR blog-dshr-org-2470 184 21 ( ( -LRB- blog-dshr-org-2470 184 22 compute compute VB blog-dshr-org-2470 184 23 more more RBR blog-dshr-org-2470 184 24 useless useless JJ blog-dshr-org-2470 184 25 hashes hash NNS blog-dshr-org-2470 184 26 ) ) -RRB- blog-dshr-org-2470 184 27 than than IN blog-dshr-org-2470 184 28 the the DT blog-dshr-org-2470 184 29 black black JJ blog-dshr-org-2470 184 30 hats hat NNS blog-dshr-org-2470 184 31 . . . blog-dshr-org-2470 185 1 Even even RB blog-dshr-org-2470 185 2 this this DT blog-dshr-org-2470 185 3 has have VBZ blog-dshr-org-2470 185 4 limits limit NNS blog-dshr-org-2470 185 5 . . . blog-dshr-org-2470 186 1 Eric Eric NNP blog-dshr-org-2470 186 2 Budish Budish NNP blog-dshr-org-2470 186 3 's 's POS blog-dshr-org-2470 186 4 analysis analysis NN blog-dshr-org-2470 186 5 shows show VBZ blog-dshr-org-2470 186 6 that that IN blog-dshr-org-2470 186 7 , , , blog-dshr-org-2470 186 8 if if IN blog-dshr-org-2470 186 9 the the DT blog-dshr-org-2470 186 10 potential potential JJ blog-dshr-org-2470 186 11 gain gain NN blog-dshr-org-2470 186 12 from from IN blog-dshr-org-2470 186 13 an an DT blog-dshr-org-2470 186 14 attack attack NN blog-dshr-org-2470 186 15 on on IN blog-dshr-org-2470 186 16 a a DT blog-dshr-org-2470 186 17 blockchain blockchain NN blog-dshr-org-2470 186 18 is be VBZ blog-dshr-org-2470 186 19 to to TO blog-dshr-org-2470 186 20 be be VB blog-dshr-org-2470 186 21 outweighed outweigh VBN blog-dshr-org-2470 186 22 by by IN blog-dshr-org-2470 186 23 its -PRON- PRP$ blog-dshr-org-2470 186 24 cost cost NN blog-dshr-org-2470 186 25 , , , blog-dshr-org-2470 186 26 the the DT blog-dshr-org-2470 186 27 value value NN blog-dshr-org-2470 186 28 of of IN blog-dshr-org-2470 186 29 transactions transaction NNS blog-dshr-org-2470 186 30 in in IN blog-dshr-org-2470 186 31 a a DT blog-dshr-org-2470 186 32 block block NN blog-dshr-org-2470 186 33 must must MD blog-dshr-org-2470 186 34 be be VB blog-dshr-org-2470 186 35 less less JJR blog-dshr-org-2470 186 36 than than IN blog-dshr-org-2470 186 37 the the DT blog-dshr-org-2470 186 38 block block NN blog-dshr-org-2470 186 39 reward reward NN blog-dshr-org-2470 186 40 . . . blog-dshr-org-2470 187 1 Would Would MD blog-dshr-org-2470 187 2 a a DT blog-dshr-org-2470 187 3 similar similar JJ blog-dshr-org-2470 187 4 defense defense NN blog-dshr-org-2470 187 5 against against IN blog-dshr-org-2470 187 6 " " `` blog-dshr-org-2470 187 7 Sybil Sybil NNP blog-dshr-org-2470 187 8 " " '' blog-dshr-org-2470 187 9 attacks attack NNS blog-dshr-org-2470 187 10 on on IN blog-dshr-org-2470 187 11 the the DT blog-dshr-org-2470 187 12 software software NN blog-dshr-org-2470 187 13 supply supply NN blog-dshr-org-2470 187 14 chain chain NN blog-dshr-org-2470 187 15 be be VB blog-dshr-org-2470 187 16 possible possible JJ blog-dshr-org-2470 187 17 ? ? . blog-dshr-org-2470 188 1 There there EX blog-dshr-org-2470 188 2 are be VBP blog-dshr-org-2470 188 3 a a DT blog-dshr-org-2470 188 4 number number NN blog-dshr-org-2470 188 5 of of IN blog-dshr-org-2470 188 6 issues issue NNS blog-dshr-org-2470 188 7 : : : blog-dshr-org-2470 188 8 The the DT blog-dshr-org-2470 188 9 potential potential JJ blog-dshr-org-2470 188 10 gains gain NNS blog-dshr-org-2470 188 11 from from IN blog-dshr-org-2470 188 12 such such JJ blog-dshr-org-2470 188 13 attacks attack NNS blog-dshr-org-2470 188 14 are be VBP blog-dshr-org-2470 188 15 large large JJ blog-dshr-org-2470 188 16 , , , blog-dshr-org-2470 188 17 both both DT blog-dshr-org-2470 188 18 because because IN blog-dshr-org-2470 188 19 they -PRON- PRP blog-dshr-org-2470 188 20 can can MD blog-dshr-org-2470 188 21 compromise compromise VB blog-dshr-org-2470 188 22 very very RB blog-dshr-org-2470 188 23 large large JJ blog-dshr-org-2470 188 24 numbers number NNS blog-dshr-org-2470 188 25 of of IN blog-dshr-org-2470 188 26 systems system NNS blog-dshr-org-2470 188 27 quickly quickly RB blog-dshr-org-2470 188 28 ( ( -LRB- blog-dshr-org-2470 188 29 event event NN blog-dshr-org-2470 188 30 - - HYPH blog-dshr-org-2470 188 31 stream stream NN blog-dshr-org-2470 188 32 had have VBD blog-dshr-org-2470 188 33 2 2 CD blog-dshr-org-2470 188 34 M m CD blog-dshr-org-2470 188 35 downloads download NNS blog-dshr-org-2470 188 36 ) ) -RRB- blog-dshr-org-2470 188 37 , , , blog-dshr-org-2470 188 38 and and CC blog-dshr-org-2470 188 39 because because IN blog-dshr-org-2470 188 40 the the DT blog-dshr-org-2470 188 41 banking banking NN blog-dshr-org-2470 188 42 credentials credential NNS blog-dshr-org-2470 188 43 , , , blog-dshr-org-2470 188 44 cryptocurrency cryptocurrency NN blog-dshr-org-2470 188 45 wallets wallet NNS blog-dshr-org-2470 188 46 , , , blog-dshr-org-2470 188 47 and and CC blog-dshr-org-2470 188 48 other other JJ blog-dshr-org-2470 188 49 data datum NNS blog-dshr-org-2470 188 50 these these DT blog-dshr-org-2470 188 51 systems system NNS blog-dshr-org-2470 188 52 contain contain VBP blog-dshr-org-2470 188 53 can can MD blog-dshr-org-2470 188 54 quickly quickly RB blog-dshr-org-2470 188 55 be be VB blog-dshr-org-2470 188 56 converted convert VBN blog-dshr-org-2470 188 57 into into IN blog-dshr-org-2470 188 58 large large JJ blog-dshr-org-2470 188 59 amounts amount NNS blog-dshr-org-2470 188 60 of of IN blog-dshr-org-2470 188 61 cash cash NN blog-dshr-org-2470 188 62 . . . blog-dshr-org-2470 189 1 Thus thus RB blog-dshr-org-2470 189 2 the the DT blog-dshr-org-2470 189 3 penalty penalty NN blog-dshr-org-2470 189 4 for for IN blog-dshr-org-2470 189 5 mounting mount VBG blog-dshr-org-2470 189 6 an an DT blog-dshr-org-2470 189 7 attack attack NN blog-dshr-org-2470 189 8 would would MD blog-dshr-org-2470 189 9 have have VB blog-dshr-org-2470 189 10 to to TO blog-dshr-org-2470 189 11 be be VB blog-dshr-org-2470 189 12 an an DT blog-dshr-org-2470 189 13 even even RB blog-dshr-org-2470 189 14 larger large JJR blog-dshr-org-2470 189 15 amount amount NN blog-dshr-org-2470 189 16 of of IN blog-dshr-org-2470 189 17 cash cash NN blog-dshr-org-2470 189 18 . . . blog-dshr-org-2470 190 1 Package package NN blog-dshr-org-2470 190 2 maintainers maintainer NNS blog-dshr-org-2470 190 3 would would MD blog-dshr-org-2470 190 4 need need VB blog-dshr-org-2470 190 5 to to TO blog-dshr-org-2470 190 6 be be VB blog-dshr-org-2470 190 7 bonded bond VBN blog-dshr-org-2470 190 8 or or CC blog-dshr-org-2470 190 9 insured insure VBN blog-dshr-org-2470 190 10 for for IN blog-dshr-org-2470 190 11 large large JJ blog-dshr-org-2470 190 12 sums sum NNS blog-dshr-org-2470 190 13 , , , blog-dshr-org-2470 190 14 which which WDT blog-dshr-org-2470 190 15 implies imply VBZ blog-dshr-org-2470 190 16 that that IN blog-dshr-org-2470 190 17 distributions distribution NNS blog-dshr-org-2470 190 18 and and CC blog-dshr-org-2470 190 19 package package NN blog-dshr-org-2470 190 20 libraries library NNS blog-dshr-org-2470 190 21 would would MD blog-dshr-org-2470 190 22 need need VB blog-dshr-org-2470 190 23 organizational organizational JJ blog-dshr-org-2470 190 24 structures structure NNS blog-dshr-org-2470 190 25 capable capable JJ blog-dshr-org-2470 190 26 of of IN blog-dshr-org-2470 190 27 enforcing enforce VBG blog-dshr-org-2470 190 28 these these DT blog-dshr-org-2470 190 29 requirements requirement NNS blog-dshr-org-2470 190 30 . . . blog-dshr-org-2470 191 1 Bonding bonding NN blog-dshr-org-2470 191 2 and and CC blog-dshr-org-2470 191 3 insurance insurance NN blog-dshr-org-2470 191 4 would would MD blog-dshr-org-2470 191 5 be be VB blog-dshr-org-2470 191 6 expensive expensive JJ blog-dshr-org-2470 191 7 for for IN blog-dshr-org-2470 191 8 package package NN blog-dshr-org-2470 191 9 maintainers maintainer NNS blog-dshr-org-2470 191 10 , , , blog-dshr-org-2470 191 11 who who WP blog-dshr-org-2470 191 12 are be VBP blog-dshr-org-2470 191 13 mostly mostly RB blog-dshr-org-2470 191 14 unpaid unpaid JJ blog-dshr-org-2470 191 15 volunteers volunteer NNS blog-dshr-org-2470 191 16 . . . blog-dshr-org-2470 192 1 There there EX blog-dshr-org-2470 192 2 would would MD blog-dshr-org-2470 192 3 have have VB blog-dshr-org-2470 192 4 to to TO blog-dshr-org-2470 192 5 be be VB blog-dshr-org-2470 192 6 a a DT blog-dshr-org-2470 192 7 way way NN blog-dshr-org-2470 192 8 of of IN blog-dshr-org-2470 192 9 paying pay VBG blog-dshr-org-2470 192 10 them -PRON- PRP blog-dshr-org-2470 192 11 for for IN blog-dshr-org-2470 192 12 their -PRON- PRP$ blog-dshr-org-2470 192 13 efforts effort NNS blog-dshr-org-2470 192 14 , , , blog-dshr-org-2470 192 15 at at IN blog-dshr-org-2470 192 16 least least JJS blog-dshr-org-2470 192 17 enough enough RB blog-dshr-org-2470 192 18 to to TO blog-dshr-org-2470 192 19 cover cover VB blog-dshr-org-2470 192 20 the the DT blog-dshr-org-2470 192 21 costs cost NNS blog-dshr-org-2470 192 22 of of IN blog-dshr-org-2470 192 23 bonding bonding NN blog-dshr-org-2470 192 24 and and CC blog-dshr-org-2470 192 25 insurance insurance NN blog-dshr-org-2470 192 26 . . . blog-dshr-org-2470 193 1 Thus thus RB blog-dshr-org-2470 193 2 users user NNS blog-dshr-org-2470 193 3 of of IN blog-dshr-org-2470 193 4 the the DT blog-dshr-org-2470 193 5 packages package NNS blog-dshr-org-2470 193 6 would would MD blog-dshr-org-2470 193 7 need need VB blog-dshr-org-2470 193 8 to to TO blog-dshr-org-2470 193 9 pay pay VB blog-dshr-org-2470 193 10 for for IN blog-dshr-org-2470 193 11 their -PRON- PRP$ blog-dshr-org-2470 193 12 use use NN blog-dshr-org-2470 193 13 , , , blog-dshr-org-2470 193 14 which which WDT blog-dshr-org-2470 193 15 means mean VBZ blog-dshr-org-2470 193 16 the the DT blog-dshr-org-2470 193 17 packages package NNS blog-dshr-org-2470 193 18 could could MD blog-dshr-org-2470 193 19 neither neither CC blog-dshr-org-2470 193 20 be be VB blog-dshr-org-2470 193 21 free free JJ blog-dshr-org-2470 193 22 , , , blog-dshr-org-2470 193 23 nor nor CC blog-dshr-org-2470 193 24 open open JJ blog-dshr-org-2470 193 25 source source NN blog-dshr-org-2470 193 26 . . . blog-dshr-org-2470 194 1 The the DT blog-dshr-org-2470 194 2 FOSS FOSS NNP blog-dshr-org-2470 194 3 ( ( -LRB- blog-dshr-org-2470 194 4 Free Free NNP blog-dshr-org-2470 194 5 Open open JJ blog-dshr-org-2470 194 6 Source source NN blog-dshr-org-2470 194 7 Software Software NNP blog-dshr-org-2470 194 8 ) ) -RRB- blog-dshr-org-2470 194 9 movement movement NN blog-dshr-org-2470 194 10 will will MD blog-dshr-org-2470 194 11 need need VB blog-dshr-org-2470 194 12 to to TO blog-dshr-org-2470 194 13 find find VB blog-dshr-org-2470 194 14 other other JJ blog-dshr-org-2470 194 15 ways way NNS blog-dshr-org-2470 194 16 to to TO blog-dshr-org-2470 194 17 combat combat VB blog-dshr-org-2470 194 18 Sybil Sybil NNP blog-dshr-org-2470 194 19 attacks attack NNS blog-dshr-org-2470 194 20 , , , blog-dshr-org-2470 194 21 which which WDT blog-dshr-org-2470 194 22 will will MD blog-dshr-org-2470 194 23 be be VB blog-dshr-org-2470 194 24 hard hard JJ blog-dshr-org-2470 194 25 if if IN blog-dshr-org-2470 194 26 the the DT blog-dshr-org-2470 194 27 reward reward NN blog-dshr-org-2470 194 28 for for IN blog-dshr-org-2470 194 29 a a DT blog-dshr-org-2470 194 30 successful successful JJ blog-dshr-org-2470 194 31 attack attack NN blog-dshr-org-2470 194 32 greatly greatly RB blog-dshr-org-2470 194 33 exceeds exceed VBZ blog-dshr-org-2470 194 34 the the DT blog-dshr-org-2470 194 35 cost cost NN blog-dshr-org-2470 194 36 of of IN blog-dshr-org-2470 194 37 mounting mount VBG blog-dshr-org-2470 194 38 it -PRON- PRP blog-dshr-org-2470 194 39 . . . blog-dshr-org-2470 195 1 How how WRB blog-dshr-org-2470 195 2 to to TO blog-dshr-org-2470 195 3 adequately adequately RB blog-dshr-org-2470 195 4 reward reward VB blog-dshr-org-2470 195 5 maintainers maintainer NNS blog-dshr-org-2470 195 6 for for IN blog-dshr-org-2470 195 7 their -PRON- PRP$ blog-dshr-org-2470 195 8 essential essential JJ blog-dshr-org-2470 195 9 but but CC blog-dshr-org-2470 195 10 under under RB blog-dshr-org-2470 195 11 - - HYPH blog-dshr-org-2470 195 12 appreciated appreciate VBN blog-dshr-org-2470 195 13 efforts effort NNS blog-dshr-org-2470 195 14 is be VBZ blog-dshr-org-2470 195 15 a a DT blog-dshr-org-2470 195 16 fundamental fundamental JJ blog-dshr-org-2470 195 17 problem problem NN blog-dshr-org-2470 195 18 for for IN blog-dshr-org-2470 195 19 FOSS FOSS NNP blog-dshr-org-2470 195 20 . . . blog-dshr-org-2470 196 1 Hof Hof NNP blog-dshr-org-2470 196 2 and and CC blog-dshr-org-2470 196 3 Carle Carle NNP blog-dshr-org-2470 196 4 's 's POS blog-dshr-org-2470 196 5 system system NN blog-dshr-org-2470 196 6 shares share VBZ blog-dshr-org-2470 196 7 one one CD blog-dshr-org-2470 196 8 more more JJR blog-dshr-org-2470 196 9 difficulty difficulty NN blog-dshr-org-2470 196 10 with with IN blog-dshr-org-2470 196 11 CT CT NNP blog-dshr-org-2470 196 12 . . . blog-dshr-org-2470 197 1 Both both DT blog-dshr-org-2470 197 2 systems system NNS blog-dshr-org-2470 197 3 are be VBP blog-dshr-org-2470 197 4 layered layer VBN blog-dshr-org-2470 197 5 on on IN blog-dshr-org-2470 197 6 top top NN blog-dshr-org-2470 197 7 of of IN blog-dshr-org-2470 197 8 an an DT blog-dshr-org-2470 197 9 existing exist VBG blog-dshr-org-2470 197 10 infrastructure infrastructure NN blog-dshr-org-2470 197 11 , , , blog-dshr-org-2470 197 12 respectively respectively RB blog-dshr-org-2470 197 13 APT apt NN blog-dshr-org-2470 197 14 and and CC blog-dshr-org-2470 197 15 TLS TLS NNP blog-dshr-org-2470 197 16 with with IN blog-dshr-org-2470 197 17 certificate certificate NN blog-dshr-org-2470 197 18 authorities authority NNS blog-dshr-org-2470 197 19 . . . blog-dshr-org-2470 198 1 In in IN blog-dshr-org-2470 198 2 both both DT blog-dshr-org-2470 198 3 cases case NNS blog-dshr-org-2470 198 4 there there EX blog-dshr-org-2470 198 5 is be VBZ blog-dshr-org-2470 198 6 a a DT blog-dshr-org-2470 198 7 bootstrap bootstrap NN blog-dshr-org-2470 198 8 problem problem NN blog-dshr-org-2470 198 9 , , , blog-dshr-org-2470 198 10 an an DT blog-dshr-org-2470 198 11 assumption assumption NN blog-dshr-org-2470 198 12 that that IN blog-dshr-org-2470 198 13 as as IN blog-dshr-org-2470 198 14 the the DT blog-dshr-org-2470 198 15 system system NN blog-dshr-org-2470 198 16 starts start VBZ blog-dshr-org-2470 198 17 up up RB blog-dshr-org-2470 198 18 there there EX blog-dshr-org-2470 198 19 is be VBZ blog-dshr-org-2470 198 20 not not RB blog-dshr-org-2470 198 21 an an DT blog-dshr-org-2470 198 22 attack attack NN blog-dshr-org-2470 198 23 already already RB blog-dshr-org-2470 198 24 underway underway JJ blog-dshr-org-2470 198 25 . . . blog-dshr-org-2470 199 1 In in IN blog-dshr-org-2470 199 2 CT CT NNP blog-dshr-org-2470 199 3 's 's POS blog-dshr-org-2470 199 4 case case NN blog-dshr-org-2470 199 5 the the DT blog-dshr-org-2470 199 6 communications communication NNS blog-dshr-org-2470 199 7 between between IN blog-dshr-org-2470 199 8 the the DT blog-dshr-org-2470 199 9 CA CA NNP blog-dshr-org-2470 199 10 's 's POS blog-dshr-org-2470 199 11 , , , blog-dshr-org-2470 199 12 Web web NN blog-dshr-org-2470 199 13 sites site NNS blog-dshr-org-2470 199 14 , , , blog-dshr-org-2470 199 15 logs log NNS blog-dshr-org-2470 199 16 , , , blog-dshr-org-2470 199 17 auditors auditor NNS blog-dshr-org-2470 199 18 and and CC blog-dshr-org-2470 199 19 monitors monitor NNS blog-dshr-org-2470 199 20 all all DT blog-dshr-org-2470 199 21 use use VBP blog-dshr-org-2470 199 22 the the DT blog-dshr-org-2470 199 23 very very JJ blog-dshr-org-2470 199 24 TLS tls NN blog-dshr-org-2470 199 25 infrastructure infrastructure NN blog-dshr-org-2470 199 26 that that WDT blog-dshr-org-2470 199 27 is be VBZ blog-dshr-org-2470 199 28 being be VBG blog-dshr-org-2470 199 29 secured secure VBN blog-dshr-org-2470 199 30 ( ( -LRB- blog-dshr-org-2470 199 31 see see VB blog-dshr-org-2470 199 32 here here RB blog-dshr-org-2470 199 33 and and CC blog-dshr-org-2470 199 34 here here RB blog-dshr-org-2470 199 35 ) ) -RRB- blog-dshr-org-2470 199 36 . . . blog-dshr-org-2470 200 1 This this DT blog-dshr-org-2470 200 2 is be VBZ blog-dshr-org-2470 200 3 also also RB blog-dshr-org-2470 200 4 the the DT blog-dshr-org-2470 200 5 case case NN blog-dshr-org-2470 200 6 for for IN blog-dshr-org-2470 200 7 Hof Hof NNP blog-dshr-org-2470 200 8 and and CC blog-dshr-org-2470 200 9 Carle Carle NNP blog-dshr-org-2470 200 10 , , , blog-dshr-org-2470 200 11 plus plus CC blog-dshr-org-2470 200 12 they -PRON- PRP blog-dshr-org-2470 200 13 have have VBP blog-dshr-org-2470 200 14 to to TO blog-dshr-org-2470 200 15 assume assume VB blog-dshr-org-2470 200 16 the the DT blog-dshr-org-2470 200 17 lack lack NN blog-dshr-org-2470 200 18 of of IN blog-dshr-org-2470 200 19 malware malware NN blog-dshr-org-2470 200 20 in in IN blog-dshr-org-2470 200 21 the the DT blog-dshr-org-2470 200 22 initial initial JJ blog-dshr-org-2470 200 23 state state NN blog-dshr-org-2470 200 24 of of IN blog-dshr-org-2470 200 25 the the DT blog-dshr-org-2470 200 26 packages package NNS blog-dshr-org-2470 200 27 . . . blog-dshr-org-2470 201 1 Hardware Hardware NNP blog-dshr-org-2470 201 2 Supply Supply NNP blog-dshr-org-2470 201 3 Chain chain NN blog-dshr-org-2470 201 4 Problems problem NNS blog-dshr-org-2470 201 5 All all PDT blog-dshr-org-2470 201 6 this this DT blog-dshr-org-2470 201 7 effort effort NN blog-dshr-org-2470 201 8 to to TO blog-dshr-org-2470 201 9 secure secure VB blog-dshr-org-2470 201 10 the the DT blog-dshr-org-2470 201 11 software software NN blog-dshr-org-2470 201 12 supply supply NN blog-dshr-org-2470 201 13 chain chain NN blog-dshr-org-2470 201 14 will will MD blog-dshr-org-2470 201 15 be be VB blog-dshr-org-2470 201 16 for for IN blog-dshr-org-2470 201 17 naught naught NN blog-dshr-org-2470 201 18 if if IN blog-dshr-org-2470 201 19 the the DT blog-dshr-org-2470 201 20 hardware hardware NN blog-dshr-org-2470 201 21 it -PRON- PRP blog-dshr-org-2470 201 22 runs run VBZ blog-dshr-org-2470 201 23 on on IN blog-dshr-org-2470 201 24 is be VBZ blog-dshr-org-2470 201 25 compromised compromise VBN blog-dshr-org-2470 201 26 : : : blog-dshr-org-2470 201 27 Much much JJ blog-dshr-org-2470 201 28 of of IN blog-dshr-org-2470 201 29 what what WP blog-dshr-org-2470 201 30 we -PRON- PRP blog-dshr-org-2470 201 31 think think VBP blog-dshr-org-2470 201 32 of of IN blog-dshr-org-2470 201 33 as as IN blog-dshr-org-2470 201 34 " " `` blog-dshr-org-2470 201 35 hardware hardware NN blog-dshr-org-2470 201 36 " " '' blog-dshr-org-2470 201 37 contains contain VBZ blog-dshr-org-2470 201 38 software software NN blog-dshr-org-2470 201 39 to to TO blog-dshr-org-2470 201 40 which which WDT blog-dshr-org-2470 201 41 what what WP blog-dshr-org-2470 201 42 we -PRON- PRP blog-dshr-org-2470 201 43 think think VBP blog-dshr-org-2470 201 44 of of IN blog-dshr-org-2470 201 45 as as IN blog-dshr-org-2470 201 46 " " `` blog-dshr-org-2470 201 47 software software NN blog-dshr-org-2470 201 48 " " '' blog-dshr-org-2470 201 49 has have VBZ blog-dshr-org-2470 201 50 no no DT blog-dshr-org-2470 201 51 access access NN blog-dshr-org-2470 201 52 or or CC blog-dshr-org-2470 201 53 visibility visibility NN blog-dshr-org-2470 201 54 . . . blog-dshr-org-2470 202 1 Examples example NNS blog-dshr-org-2470 202 2 include include VBP blog-dshr-org-2470 202 3 Intel Intel NNP blog-dshr-org-2470 202 4 's 's POS blog-dshr-org-2470 202 5 Management Management NNP blog-dshr-org-2470 202 6 Engine Engine NNP blog-dshr-org-2470 202 7 , , , blog-dshr-org-2470 202 8 the the DT blog-dshr-org-2470 202 9 baseband baseband NN blog-dshr-org-2470 202 10 processor processor NN blog-dshr-org-2470 202 11 in in IN blog-dshr-org-2470 202 12 mobile mobile JJ blog-dshr-org-2470 202 13 devices device NNS blog-dshr-org-2470 202 14 , , , blog-dshr-org-2470 202 15 complex complex JJ blog-dshr-org-2470 202 16 I i NN blog-dshr-org-2470 202 17 / / SYM blog-dshr-org-2470 202 18 O o NN blog-dshr-org-2470 202 19 devices device NNS blog-dshr-org-2470 202 20 such such JJ blog-dshr-org-2470 202 21 as as IN blog-dshr-org-2470 202 22 NICs nic NNS blog-dshr-org-2470 202 23 and and CC blog-dshr-org-2470 202 24 GPUs gpu NNS blog-dshr-org-2470 202 25 . . . blog-dshr-org-2470 203 1 Even even RB blog-dshr-org-2470 203 2 if if IN blog-dshr-org-2470 203 3 this this DT blog-dshr-org-2470 203 4 " " `` blog-dshr-org-2470 203 5 firmware firmware NN blog-dshr-org-2470 203 6 " " '' blog-dshr-org-2470 203 7 is be VBZ blog-dshr-org-2470 203 8 visible visible JJ blog-dshr-org-2470 203 9 to to IN blog-dshr-org-2470 203 10 the the DT blog-dshr-org-2470 203 11 system system NN blog-dshr-org-2470 203 12 CPU cpu NN blog-dshr-org-2470 203 13 , , , blog-dshr-org-2470 203 14 it -PRON- PRP blog-dshr-org-2470 203 15 is be VBZ blog-dshr-org-2470 203 16 likely likely RB blog-dshr-org-2470 203 17 supplied supply VBN blog-dshr-org-2470 203 18 as as IN blog-dshr-org-2470 203 19 a a DT blog-dshr-org-2470 203 20 " " `` blog-dshr-org-2470 203 21 binary binary JJ blog-dshr-org-2470 203 22 blob blob NN blog-dshr-org-2470 203 23 " " '' blog-dshr-org-2470 203 24 whose whose WP$ blog-dshr-org-2470 203 25 source source NN blog-dshr-org-2470 203 26 code code NN blog-dshr-org-2470 203 27 is be VBZ blog-dshr-org-2470 203 28 inaccessible inaccessible JJ blog-dshr-org-2470 203 29 . . . blog-dshr-org-2470 204 1 Attacks attack NNS blog-dshr-org-2470 204 2 on on IN blog-dshr-org-2470 204 3 the the DT blog-dshr-org-2470 204 4 hardware hardware NN blog-dshr-org-2470 204 5 supply supply NN blog-dshr-org-2470 204 6 chain chain NN blog-dshr-org-2470 204 7 have have VBP blog-dshr-org-2470 204 8 been be VBN blog-dshr-org-2470 204 9 in in IN blog-dshr-org-2470 204 10 the the DT blog-dshr-org-2470 204 11 news news NN blog-dshr-org-2470 204 12 recently recently RB blog-dshr-org-2470 204 13 , , , blog-dshr-org-2470 204 14 with with IN blog-dshr-org-2470 204 15 the the DT blog-dshr-org-2470 204 16 firestorm firestorm NN blog-dshr-org-2470 204 17 of of IN blog-dshr-org-2470 204 18 publicity publicity NN blog-dshr-org-2470 204 19 sparked spark VBN blog-dshr-org-2470 204 20 by by IN blog-dshr-org-2470 204 21 Bloomberg Bloomberg NNP blog-dshr-org-2470 204 22 's 's POS blog-dshr-org-2470 204 23 , , , blog-dshr-org-2470 204 24 probably probably RB blog-dshr-org-2470 204 25 erroneous erroneous JJ blog-dshr-org-2470 204 26 reports report NNS blog-dshr-org-2470 204 27 , , , blog-dshr-org-2470 204 28 of of IN blog-dshr-org-2470 204 29 a a DT blog-dshr-org-2470 204 30 Chinese chinese JJ blog-dshr-org-2470 204 31 attack attack NN blog-dshr-org-2470 204 32 on on IN blog-dshr-org-2470 204 33 SuperMicro SuperMicro NNP blog-dshr-org-2470 204 34 motherboards motherboard NNS blog-dshr-org-2470 204 35 that that WDT blog-dshr-org-2470 204 36 added add VBD blog-dshr-org-2470 204 37 " " `` blog-dshr-org-2470 204 38 rice rice NN blog-dshr-org-2470 204 39 - - HYPH blog-dshr-org-2470 204 40 grain grain NN blog-dshr-org-2470 204 41 " " '' blog-dshr-org-2470 204 42 sized sized JJ blog-dshr-org-2470 204 43 malign malign NN blog-dshr-org-2470 204 44 chips chip NNS blog-dshr-org-2470 204 45 . . . blog-dshr-org-2470 205 1 The the DT blog-dshr-org-2470 205 2 details detail NNS blog-dshr-org-2470 205 3 will will MD blog-dshr-org-2470 205 4 have have VB blog-dshr-org-2470 205 5 to to TO blog-dshr-org-2470 205 6 wait wait VB blog-dshr-org-2470 205 7 for for IN blog-dshr-org-2470 205 8 a a DT blog-dshr-org-2470 205 9 future future JJ blog-dshr-org-2470 205 10 post post NN blog-dshr-org-2470 205 11 . . . blog-dshr-org-2470 206 1 Posted post VBN blog-dshr-org-2470 206 2 by by IN blog-dshr-org-2470 206 3 David David NNP blog-dshr-org-2470 206 4 . . . blog-dshr-org-2470 207 1 at at IN blog-dshr-org-2470 207 2 8:00 8:00 CD blog-dshr-org-2470 207 3 AM am NN blog-dshr-org-2470 207 4 Labels Labels NNPS blog-dshr-org-2470 207 5 : : : blog-dshr-org-2470 207 6 security security NN blog-dshr-org-2470 207 7 24 24 CD blog-dshr-org-2470 207 8 comments comment NNS blog-dshr-org-2470 207 9 : : : blog-dshr-org-2470 207 10 Bryan Bryan NNP blog-dshr-org-2470 207 11 Newbold Newbold NNP blog-dshr-org-2470 207 12 said say VBD blog-dshr-org-2470 207 13 ... ... : blog-dshr-org-2470 207 14 Nit Nit NNP blog-dshr-org-2470 207 15 : : : blog-dshr-org-2470 207 16 in in IN blog-dshr-org-2470 207 17 the the DT blog-dshr-org-2470 207 18 last last JJ blog-dshr-org-2470 207 19 bullet bullet NN blog-dshr-org-2470 207 20 point point NN blog-dshr-org-2470 207 21 , , , blog-dshr-org-2470 207 22 I -PRON- PRP blog-dshr-org-2470 207 23 think think VBP blog-dshr-org-2470 207 24 you -PRON- PRP blog-dshr-org-2470 207 25 mean mean VBP blog-dshr-org-2470 207 26 " " `` blog-dshr-org-2470 207 27 Bloomberg Bloomberg NNP blog-dshr-org-2470 207 28 " " '' blog-dshr-org-2470 207 29 , , , blog-dshr-org-2470 207 30 not not RB blog-dshr-org-2470 207 31 " " `` blog-dshr-org-2470 207 32 Motherboard Motherboard NNP blog-dshr-org-2470 207 33 " " '' blog-dshr-org-2470 207 34 . . . blog-dshr-org-2470 208 1 December December NNP blog-dshr-org-2470 208 2 18 18 CD blog-dshr-org-2470 208 3 , , , blog-dshr-org-2470 208 4 2018 2018 CD blog-dshr-org-2470 208 5 at at IN blog-dshr-org-2470 208 6 1:58 1:58 CD blog-dshr-org-2470 208 7 PM pm NN blog-dshr-org-2470 208 8 David David NNP blog-dshr-org-2470 208 9 . . . blog-dshr-org-2470 209 1 said say VBD blog-dshr-org-2470 209 2 ... ... : blog-dshr-org-2470 210 1 Thanks thank NNS blog-dshr-org-2470 210 2 for for IN blog-dshr-org-2470 210 3 correcting correct VBG blog-dshr-org-2470 210 4 my -PRON- PRP$ blog-dshr-org-2470 210 5 fused fuse VBN blog-dshr-org-2470 210 6 neurons neuron NNS blog-dshr-org-2470 210 7 , , , blog-dshr-org-2470 210 8 Bryan Bryan NNP blog-dshr-org-2470 210 9 ! ! . blog-dshr-org-2470 211 1 December December NNP blog-dshr-org-2470 211 2 18 18 CD blog-dshr-org-2470 211 3 , , , blog-dshr-org-2470 211 4 2018 2018 CD blog-dshr-org-2470 211 5 at at IN blog-dshr-org-2470 211 6 4:10 4:10 CD blog-dshr-org-2470 211 7 PM pm NN blog-dshr-org-2470 211 8 David David NNP blog-dshr-org-2470 211 9 . . . blog-dshr-org-2470 212 1 said say VBD blog-dshr-org-2470 212 2 ... ... : blog-dshr-org-2470 213 1 I -PRON- PRP blog-dshr-org-2470 213 2 really really RB blog-dshr-org-2470 213 3 should should MD blog-dshr-org-2470 213 4 have have VB blog-dshr-org-2470 213 5 pointed point VBN blog-dshr-org-2470 213 6 out out RP blog-dshr-org-2470 213 7 that that IN blog-dshr-org-2470 213 8 this this DT blog-dshr-org-2470 213 9 whole whole JJ blog-dshr-org-2470 213 10 post post NN blog-dshr-org-2470 213 11 is be VBZ blog-dshr-org-2470 213 12 about about IN blog-dshr-org-2470 213 13 software software NN blog-dshr-org-2470 213 14 that that WDT blog-dshr-org-2470 213 15 is be VBZ blog-dshr-org-2470 213 16 installed instal VBN blog-dshr-org-2470 213 17 on on IN blog-dshr-org-2470 213 18 your -PRON- PRP$ blog-dshr-org-2470 213 19 device device NN blog-dshr-org-2470 213 20 . . . blog-dshr-org-2470 214 1 These these DT blog-dshr-org-2470 214 2 days day NNS blog-dshr-org-2470 214 3 , , , blog-dshr-org-2470 214 4 much much JJ blog-dshr-org-2470 214 5 of of IN blog-dshr-org-2470 214 6 the the DT blog-dshr-org-2470 214 7 software software NN blog-dshr-org-2470 214 8 that that WDT blog-dshr-org-2470 214 9 runs run VBZ blog-dshr-org-2470 214 10 on on IN blog-dshr-org-2470 214 11 your -PRON- PRP$ blog-dshr-org-2470 214 12 device device NN blog-dshr-org-2470 214 13 is be VBZ blog-dshr-org-2470 214 14 not not RB blog-dshr-org-2470 214 15 installed instal VBN blog-dshr-org-2470 214 16 , , , blog-dshr-org-2470 214 17 it -PRON- PRP blog-dshr-org-2470 214 18 is be VBZ blog-dshr-org-2470 214 19 delivered deliver VBN blog-dshr-org-2470 214 20 via via IN blog-dshr-org-2470 214 21 ad ad NN blog-dshr-org-2470 214 22 networks network NNS blog-dshr-org-2470 214 23 and and CC blog-dshr-org-2470 214 24 runs run VBZ blog-dshr-org-2470 214 25 inside inside IN blog-dshr-org-2470 214 26 your -PRON- PRP$ blog-dshr-org-2470 214 27 browser browser NN blog-dshr-org-2470 214 28 . . . blog-dshr-org-2470 215 1 As as IN blog-dshr-org-2470 215 2 blissex blissex NNP blog-dshr-org-2470 215 3 wrote write VBD blog-dshr-org-2470 215 4 in in IN blog-dshr-org-2470 215 5 this this DT blog-dshr-org-2470 215 6 comment comment NN blog-dshr-org-2470 215 7 , , , blog-dshr-org-2470 215 8 we -PRON- PRP blog-dshr-org-2470 215 9 are be VBP blog-dshr-org-2470 215 10 living live VBG blog-dshr-org-2470 215 11 : : : blog-dshr-org-2470 215 12 " " `` blog-dshr-org-2470 215 13 in in IN blog-dshr-org-2470 215 14 an an DT blog-dshr-org-2470 215 15 age age NN blog-dshr-org-2470 215 16 in in IN blog-dshr-org-2470 215 17 which which WDT blog-dshr-org-2470 215 18 every every DT blog-dshr-org-2470 215 19 browser browser NN blog-dshr-org-2470 215 20 gifts gift VBZ blog-dshr-org-2470 215 21 a a DT blog-dshr-org-2470 215 22 free free JJ blog-dshr-org-2470 215 23 - - HYPH blog-dshr-org-2470 215 24 to to IN blog-dshr-org-2470 215 25 - - HYPH blog-dshr-org-2470 215 26 use use NN blog-dshr-org-2470 215 27 , , , blog-dshr-org-2470 215 28 unlimited unlimited JJ blog-dshr-org-2470 215 29 - - HYPH blog-dshr-org-2470 215 30 usage usage NN blog-dshr-org-2470 215 31 , , , blog-dshr-org-2470 215 32 fast fast JJ blog-dshr-org-2470 215 33 VM VM NNP blog-dshr-org-2470 215 34 to to IN blog-dshr-org-2470 215 35 every every DT blog-dshr-org-2470 215 36 visited visit VBN blog-dshr-org-2470 215 37 web web NN blog-dshr-org-2470 215 38 site site NN blog-dshr-org-2470 215 39 , , , blog-dshr-org-2470 215 40 and and CC blog-dshr-org-2470 215 41 these these DT blog-dshr-org-2470 215 42 VMs vm NNS blog-dshr-org-2470 215 43 can can MD blog-dshr-org-2470 215 44 boot boot VB blog-dshr-org-2470 215 45 and and CC blog-dshr-org-2470 215 46 run run VB blog-dshr-org-2470 215 47 quite quite RB blog-dshr-org-2470 215 48 responsive responsive JJ blog-dshr-org-2470 215 49 3D 3d JJ blog-dshr-org-2470 215 50 games game NNS blog-dshr-org-2470 215 51 or or CC blog-dshr-org-2470 215 52 Linux Linux NNP blog-dshr-org-2470 215 53 distributions distribution NNS blog-dshr-org-2470 215 54 " " `` blog-dshr-org-2470 215 55 Ad ad NN blog-dshr-org-2470 215 56 blockers blocker NNS blog-dshr-org-2470 215 57 , , , blog-dshr-org-2470 215 58 essential essential JJ blog-dshr-org-2470 215 59 equipment equipment NN blog-dshr-org-2470 215 60 in in IN blog-dshr-org-2470 215 61 this this DT blog-dshr-org-2470 215 62 age age NN blog-dshr-org-2470 215 63 , , , blog-dshr-org-2470 215 64 merely merely RB blog-dshr-org-2470 215 65 reduce reduce VBP blog-dshr-org-2470 215 66 the the DT blog-dshr-org-2470 215 67 incidence incidence NN blog-dshr-org-2470 215 68 of of IN blog-dshr-org-2470 215 69 malware malware NNP blog-dshr-org-2470 215 70 delivered deliver VBN blog-dshr-org-2470 215 71 via via IN blog-dshr-org-2470 215 72 ad ad NN blog-dshr-org-2470 215 73 networks network NNS blog-dshr-org-2470 215 74 . . . blog-dshr-org-2470 216 1 Brannon Brannon NNP blog-dshr-org-2470 216 2 Dorsey Dorsey NNP blog-dshr-org-2470 216 3 's 's POS blog-dshr-org-2470 216 4 fascinating fascinating JJ blog-dshr-org-2470 216 5 experiments experiment NNS blog-dshr-org-2470 216 6 in in IN blog-dshr-org-2470 216 7 malvertising malvertising NN blog-dshr-org-2470 216 8 are be VBP blog-dshr-org-2470 216 9 described describe VBN blog-dshr-org-2470 216 10 by by IN blog-dshr-org-2470 216 11 Cory Cory NNP blog-dshr-org-2470 216 12 Doctorow Doctorow NNP blog-dshr-org-2470 216 13 thus thus RB blog-dshr-org-2470 216 14 : : : blog-dshr-org-2470 216 15 " " `` blog-dshr-org-2470 216 16 Anyone anyone NN blog-dshr-org-2470 216 17 can can MD blog-dshr-org-2470 216 18 make make VB blog-dshr-org-2470 216 19 an an DT blog-dshr-org-2470 216 20 account account NN blog-dshr-org-2470 216 21 , , , blog-dshr-org-2470 216 22 create create VB blog-dshr-org-2470 216 23 an an DT blog-dshr-org-2470 216 24 ad ad NN blog-dshr-org-2470 216 25 with with IN blog-dshr-org-2470 216 26 god god NNP blog-dshr-org-2470 216 27 - - HYPH blog-dshr-org-2470 216 28 knows knows NNP blog-dshr-org-2470 216 29 - - : blog-dshr-org-2470 216 30 what what WP blog-dshr-org-2470 216 31 Javascript Javascript NNP blog-dshr-org-2470 216 32 in in IN blog-dshr-org-2470 216 33 it -PRON- PRP blog-dshr-org-2470 216 34 , , , blog-dshr-org-2470 216 35 then then RB blog-dshr-org-2470 216 36 pay pay VB blog-dshr-org-2470 216 37 to to TO blog-dshr-org-2470 216 38 have have VB blog-dshr-org-2470 216 39 the the DT blog-dshr-org-2470 216 40 network network NN blog-dshr-org-2470 216 41 serve serve VB blog-dshr-org-2470 216 42 that that IN blog-dshr-org-2470 216 43 ad ad NN blog-dshr-org-2470 216 44 up up IN blog-dshr-org-2470 216 45 to to IN blog-dshr-org-2470 216 46 thousands thousand NNS blog-dshr-org-2470 216 47 of of IN blog-dshr-org-2470 216 48 browser browser NN blog-dshr-org-2470 216 49 . . . blog-dshr-org-2470 217 1 ... ... NFP blog-dshr-org-2470 218 1 Within within IN blog-dshr-org-2470 218 2 about about RB blog-dshr-org-2470 218 3 three three CD blog-dshr-org-2470 218 4 hours hour NNS blog-dshr-org-2470 218 5 , , , blog-dshr-org-2470 218 6 his -PRON- PRP$ blog-dshr-org-2470 218 7 code code NN blog-dshr-org-2470 218 8 ( ( -LRB- blog-dshr-org-2470 218 9 experimental experimental JJ blog-dshr-org-2470 218 10 , , , blog-dshr-org-2470 218 11 not not RB blog-dshr-org-2470 218 12 malicious malicious JJ blog-dshr-org-2470 218 13 , , , blog-dshr-org-2470 218 14 apart apart RB blog-dshr-org-2470 218 15 from from IN blog-dshr-org-2470 218 16 surreptitiously surreptitiously RB blog-dshr-org-2470 218 17 chewing chew VBG blog-dshr-org-2470 218 18 up up RP blog-dshr-org-2470 218 19 processing processing NN blog-dshr-org-2470 218 20 resources resource NNS blog-dshr-org-2470 218 21 ) ) -RRB- blog-dshr-org-2470 218 22 was be VBD blog-dshr-org-2470 218 23 running run VBG blog-dshr-org-2470 218 24 on on IN blog-dshr-org-2470 218 25 117,852 117,852 CD blog-dshr-org-2470 218 26 web web NN blog-dshr-org-2470 218 27 browsers browser NNS blog-dshr-org-2470 218 28 , , , blog-dshr-org-2470 218 29 on on IN blog-dshr-org-2470 218 30 30,234 30,234 CD blog-dshr-org-2470 218 31 unique unique JJ blog-dshr-org-2470 218 32 IP IP NNP blog-dshr-org-2470 218 33 addresses address NNS blog-dshr-org-2470 218 34 . . . blog-dshr-org-2470 219 1 Adtech Adtech NNP blog-dshr-org-2470 219 2 , , , blog-dshr-org-2470 219 3 it -PRON- PRP blog-dshr-org-2470 219 4 turns turn VBZ blog-dshr-org-2470 219 5 out out RP blog-dshr-org-2470 219 6 , , , blog-dshr-org-2470 219 7 is be VBZ blog-dshr-org-2470 219 8 a a DT blog-dshr-org-2470 219 9 superb superb JJ blog-dshr-org-2470 219 10 vector vector NN blog-dshr-org-2470 219 11 for for IN blog-dshr-org-2470 219 12 injecting inject VBG blog-dshr-org-2470 219 13 malware malware NN blog-dshr-org-2470 219 14 around around IN blog-dshr-org-2470 219 15 the the DT blog-dshr-org-2470 219 16 planet planet NN blog-dshr-org-2470 219 17 . . . blog-dshr-org-2470 220 1 Some some DT blog-dshr-org-2470 220 2 other other JJ blog-dshr-org-2470 220 3 fun fun JJ blog-dshr-org-2470 220 4 details detail NNS blog-dshr-org-2470 220 5 : : : blog-dshr-org-2470 220 6 Dorsey Dorsey NNP blog-dshr-org-2470 220 7 found find VBD blog-dshr-org-2470 220 8 that that IN blog-dshr-org-2470 220 9 when when WRB blog-dshr-org-2470 220 10 people people NNS blog-dshr-org-2470 220 11 loaded load VBD blog-dshr-org-2470 220 12 his -PRON- PRP$ blog-dshr-org-2470 220 13 ad ad NN blog-dshr-org-2470 220 14 , , , blog-dshr-org-2470 220 15 they -PRON- PRP blog-dshr-org-2470 220 16 left leave VBD blog-dshr-org-2470 220 17 the the DT blog-dshr-org-2470 220 18 tab tab NN blog-dshr-org-2470 220 19 open open VBP blog-dshr-org-2470 220 20 an an DT blog-dshr-org-2470 220 21 average average NN blog-dshr-org-2470 220 22 of of IN blog-dshr-org-2470 220 23 15 15 CD blog-dshr-org-2470 220 24 minutes minute NNS blog-dshr-org-2470 220 25 . . . blog-dshr-org-2470 221 1 That that DT blog-dshr-org-2470 221 2 gave give VBD blog-dshr-org-2470 221 3 him -PRON- PRP blog-dshr-org-2470 221 4 huge huge JJ blog-dshr-org-2470 221 5 amounts amount NNS blog-dshr-org-2470 221 6 of of IN blog-dshr-org-2470 221 7 compute compute JJ blog-dshr-org-2470 221 8 time time NN blog-dshr-org-2470 221 9 -- -- : blog-dshr-org-2470 221 10 327 327 CD blog-dshr-org-2470 221 11 full full JJ blog-dshr-org-2470 221 12 days day NNS blog-dshr-org-2470 221 13 , , , blog-dshr-org-2470 221 14 in in IN blog-dshr-org-2470 221 15 fact fact NN blog-dshr-org-2470 221 16 , , , blog-dshr-org-2470 221 17 for for IN blog-dshr-org-2470 221 18 about about RB blog-dshr-org-2470 221 19 $ $ $ blog-dshr-org-2470 221 20 15 15 CD blog-dshr-org-2470 221 21 in in IN blog-dshr-org-2470 221 22 ad ad NN blog-dshr-org-2470 221 23 purchase purchase NN blog-dshr-org-2470 221 24 . . . blog-dshr-org-2470 221 25 " " '' blog-dshr-org-2470 222 1 December December NNP blog-dshr-org-2470 222 2 22 22 CD blog-dshr-org-2470 222 3 , , , blog-dshr-org-2470 222 4 2018 2018 CD blog-dshr-org-2470 222 5 at at IN blog-dshr-org-2470 222 6 3:47 3:47 CD blog-dshr-org-2470 222 7 PM PM NNP blog-dshr-org-2470 222 8 David David NNP blog-dshr-org-2470 222 9 . . . blog-dshr-org-2470 223 1 said say VBD blog-dshr-org-2470 223 2 ... ... : blog-dshr-org-2470 224 1 I -PRON- PRP blog-dshr-org-2470 224 2 regret regret VBP blog-dshr-org-2470 224 3 not not RB blog-dshr-org-2470 224 4 citing cite VBG blog-dshr-org-2470 224 5 John John NNP blog-dshr-org-2470 224 6 Leyden Leyden NNP blog-dshr-org-2470 224 7 's 's POS blog-dshr-org-2470 224 8 Open open JJ blog-dshr-org-2470 224 9 - - HYPH blog-dshr-org-2470 224 10 source source NN blog-dshr-org-2470 224 11 software software NN blog-dshr-org-2470 224 12 supply supply NN blog-dshr-org-2470 224 13 chain chain NN blog-dshr-org-2470 224 14 vulns vuln NNS blog-dshr-org-2470 224 15 have have VBP blog-dshr-org-2470 224 16 doubled double VBN blog-dshr-org-2470 224 17 in in IN blog-dshr-org-2470 224 18 12 12 CD blog-dshr-org-2470 224 19 months month NNS blog-dshr-org-2470 224 20 to to TO blog-dshr-org-2470 224 21 illustrate illustrate VB blog-dshr-org-2470 224 22 the the DT blog-dshr-org-2470 224 23 scope scope NN blog-dshr-org-2470 224 24 of of IN blog-dshr-org-2470 224 25 the the DT blog-dshr-org-2470 224 26 problem problem NN blog-dshr-org-2470 224 27 : : : blog-dshr-org-2470 224 28 " " `` blog-dshr-org-2470 224 29 Miscreants miscreant NNS blog-dshr-org-2470 224 30 have have VBP blog-dshr-org-2470 224 31 even even RB blog-dshr-org-2470 224 32 started start VBN blog-dshr-org-2470 224 33 to to TO blog-dshr-org-2470 224 34 inject inject VB blog-dshr-org-2470 224 35 ( ( -LRB- blog-dshr-org-2470 224 36 or or CC blog-dshr-org-2470 224 37 mainline mainline JJ blog-dshr-org-2470 224 38 ) ) -RRB- blog-dshr-org-2470 224 39 vulnerabilities vulnerability NNS blog-dshr-org-2470 224 40 directly directly RB blog-dshr-org-2470 224 41 into into IN blog-dshr-org-2470 224 42 open open JJ blog-dshr-org-2470 224 43 source source NN blog-dshr-org-2470 224 44 projects project NNS blog-dshr-org-2470 224 45 , , , blog-dshr-org-2470 224 46 according accord VBG blog-dshr-org-2470 224 47 to to IN blog-dshr-org-2470 224 48 Sonatype Sonatype NNP blog-dshr-org-2470 224 49 , , , blog-dshr-org-2470 224 50 which which WDT blog-dshr-org-2470 224 51 cited cite VBD blog-dshr-org-2470 224 52 11 11 CD blog-dshr-org-2470 224 53 recent recent JJ blog-dshr-org-2470 224 54 examples example NNS blog-dshr-org-2470 224 55 of of IN blog-dshr-org-2470 224 56 this this DT blog-dshr-org-2470 224 57 type type NN blog-dshr-org-2470 224 58 of of IN blog-dshr-org-2470 224 59 malfeasance malfeasance NN blog-dshr-org-2470 224 60 in in IN blog-dshr-org-2470 224 61 its -PRON- PRP$ blog-dshr-org-2470 224 62 study study NN blog-dshr-org-2470 224 63 . . . blog-dshr-org-2470 225 1 El El NNP blog-dshr-org-2470 225 2 Reg Reg NNP blog-dshr-org-2470 225 3 has have VBZ blog-dshr-org-2470 225 4 reported report VBN blog-dshr-org-2470 225 5 on on IN blog-dshr-org-2470 225 6 several several JJ blog-dshr-org-2470 225 7 such such JJ blog-dshr-org-2470 225 8 incidents incident NNS blog-dshr-org-2470 225 9 including include VBG blog-dshr-org-2470 225 10 a a DT blog-dshr-org-2470 225 11 code code NN blog-dshr-org-2470 225 12 hack hack NN blog-dshr-org-2470 225 13 on on IN blog-dshr-org-2470 225 14 open open JJ blog-dshr-org-2470 225 15 - - HYPH blog-dshr-org-2470 225 16 source source NN blog-dshr-org-2470 225 17 utility utility NN blog-dshr-org-2470 225 18 eslint eslint NN blog-dshr-org-2470 225 19 - - HYPH blog-dshr-org-2470 225 20 scope scope NN blog-dshr-org-2470 225 21 back back RB blog-dshr-org-2470 225 22 in in IN blog-dshr-org-2470 225 23 July July NNP blog-dshr-org-2470 225 24 . . . blog-dshr-org-2470 225 25 " " '' blog-dshr-org-2470 226 1 and and CC blog-dshr-org-2470 226 2 : : : blog-dshr-org-2470 226 3 " " `` blog-dshr-org-2470 226 4 organisations organisation NNS blog-dshr-org-2470 226 5 are be VBP blog-dshr-org-2470 226 6 still still RB blog-dshr-org-2470 226 7 downloading download VBG blog-dshr-org-2470 226 8 vulnerable vulnerable JJ blog-dshr-org-2470 226 9 versions version NNS blog-dshr-org-2470 226 10 of of IN blog-dshr-org-2470 226 11 the the DT blog-dshr-org-2470 226 12 Apache Apache NNP blog-dshr-org-2470 226 13 Struts Struts NNP blog-dshr-org-2470 226 14 framework framework VBP blog-dshr-org-2470 226 15 at at IN blog-dshr-org-2470 226 16 much much RB blog-dshr-org-2470 226 17 the the DT blog-dshr-org-2470 226 18 same same JJ blog-dshr-org-2470 226 19 rate rate NN blog-dshr-org-2470 226 20 as as IN blog-dshr-org-2470 226 21 before before IN blog-dshr-org-2470 226 22 the the DT blog-dshr-org-2470 226 23 Equifax Equifax NNP blog-dshr-org-2470 226 24 data data NN blog-dshr-org-2470 226 25 breach breach NN blog-dshr-org-2470 226 26 , , , blog-dshr-org-2470 226 27 at at IN blog-dshr-org-2470 226 28 around around RB blog-dshr-org-2470 226 29 80,000 80,000 CD blog-dshr-org-2470 226 30 downloads download NNS blog-dshr-org-2470 226 31 per per IN blog-dshr-org-2470 226 32 month month NN blog-dshr-org-2470 226 33 . . . blog-dshr-org-2470 227 1 Downloads download NNS blog-dshr-org-2470 227 2 of of IN blog-dshr-org-2470 227 3 buggy buggy NN blog-dshr-org-2470 227 4 versions version NNS blog-dshr-org-2470 227 5 of of IN blog-dshr-org-2470 227 6 another another DT blog-dshr-org-2470 227 7 popular popular JJ blog-dshr-org-2470 227 8 web web NN blog-dshr-org-2470 227 9 application application NN blog-dshr-org-2470 227 10 framework framework NN blog-dshr-org-2470 227 11 called call VBN blog-dshr-org-2470 227 12 Spring Spring NNP blog-dshr-org-2470 227 13 were be VBD blog-dshr-org-2470 227 14 also also RB blog-dshr-org-2470 227 15 little little RB blog-dshr-org-2470 227 16 changed change VBN blog-dshr-org-2470 227 17 since since IN blog-dshr-org-2470 227 18 a a DT blog-dshr-org-2470 227 19 September September NNP blog-dshr-org-2470 227 20 2017 2017 CD blog-dshr-org-2470 227 21 vulnerability vulnerability NN blog-dshr-org-2470 227 22 , , , blog-dshr-org-2470 227 23 Sonatype Sonatype NNP blog-dshr-org-2470 227 24 added add VBD blog-dshr-org-2470 227 25 . . . blog-dshr-org-2470 228 1 The the DT blog-dshr-org-2470 228 2 85,000 85,000 CD blog-dshr-org-2470 228 3 average average NN blog-dshr-org-2470 228 4 in in IN blog-dshr-org-2470 228 5 September September NNP blog-dshr-org-2470 228 6 2017 2017 CD blog-dshr-org-2470 228 7 has have VBZ blog-dshr-org-2470 228 8 declined decline VBN blog-dshr-org-2470 228 9 only only RB blog-dshr-org-2470 228 10 15 15 CD blog-dshr-org-2470 228 11 per per NN blog-dshr-org-2470 228 12 cent cent NN blog-dshr-org-2470 228 13 to to IN blog-dshr-org-2470 228 14 72,000 72,000 CD blog-dshr-org-2470 228 15 over over IN blog-dshr-org-2470 228 16 the the DT blog-dshr-org-2470 228 17 last last JJ blog-dshr-org-2470 228 18 12 12 CD blog-dshr-org-2470 228 19 months month NNS blog-dshr-org-2470 228 20 . . . blog-dshr-org-2470 228 21 " " '' blog-dshr-org-2470 229 1 December December NNP blog-dshr-org-2470 229 2 24 24 CD blog-dshr-org-2470 229 3 , , , blog-dshr-org-2470 229 4 2018 2018 CD blog-dshr-org-2470 229 5 at at IN blog-dshr-org-2470 229 6 8:29 8:29 CD blog-dshr-org-2470 229 7 AM am NN blog-dshr-org-2470 229 8 David David NNP blog-dshr-org-2470 229 9 . . . blog-dshr-org-2470 230 1 said say VBD blog-dshr-org-2470 230 2 ... ... : blog-dshr-org-2470 230 3 Catalin Catalin NNP blog-dshr-org-2470 230 4 Cimpanu Cimpanu NNP blog-dshr-org-2470 230 5 's 's POS blog-dshr-org-2470 230 6 Users Users NNPS blog-dshr-org-2470 230 7 report report VBP blog-dshr-org-2470 230 8 losing lose VBG blog-dshr-org-2470 230 9 Bitcoin Bitcoin NNP blog-dshr-org-2470 230 10 in in IN blog-dshr-org-2470 230 11 clever clever JJ blog-dshr-org-2470 230 12 hack hack NN blog-dshr-org-2470 230 13 of of IN blog-dshr-org-2470 230 14 Electrum Electrum NNP blog-dshr-org-2470 230 15 wallets wallet NNS blog-dshr-org-2470 230 16 describes describe VBZ blog-dshr-org-2470 230 17 a a DT blog-dshr-org-2470 230 18 software software NN blog-dshr-org-2470 230 19 supply supply NN blog-dshr-org-2470 230 20 chain chain NN blog-dshr-org-2470 230 21 attack attack NN blog-dshr-org-2470 230 22 that that WDT blog-dshr-org-2470 230 23 started start VBD blog-dshr-org-2470 230 24 around around IN blog-dshr-org-2470 230 25 21st 21st JJ blog-dshr-org-2470 230 26 December December NNP blog-dshr-org-2470 230 27 and and CC blog-dshr-org-2470 230 28 netted net VBD blog-dshr-org-2470 230 29 around around IN blog-dshr-org-2470 230 30 $ $ $ blog-dshr-org-2470 230 31 750 750 CD blog-dshr-org-2470 230 32 K k NN blog-dshr-org-2470 230 33 " " '' blog-dshr-org-2470 230 34 worth worth JJ blog-dshr-org-2470 230 35 " " '' blog-dshr-org-2470 230 36 of of IN blog-dshr-org-2470 230 37 BTC BTC NNP blog-dshr-org-2470 230 38 . . . blog-dshr-org-2470 231 1 December December NNP blog-dshr-org-2470 231 2 27 27 CD blog-dshr-org-2470 231 3 , , , blog-dshr-org-2470 231 4 2018 2018 CD blog-dshr-org-2470 231 5 at at IN blog-dshr-org-2470 231 6 11:53 11:53 CD blog-dshr-org-2470 231 7 AM am NN blog-dshr-org-2470 231 8 David David NNP blog-dshr-org-2470 231 9 . . . blog-dshr-org-2470 232 1 said say VBD blog-dshr-org-2470 232 2 ... ... : blog-dshr-org-2470 232 3 Popular Popular NNP blog-dshr-org-2470 232 4 WordPress WordPress NNP blog-dshr-org-2470 232 5 plugin plugin NN blog-dshr-org-2470 232 6 hacked hack VBN blog-dshr-org-2470 232 7 by by IN blog-dshr-org-2470 232 8 angry angry JJ blog-dshr-org-2470 232 9 former former JJ blog-dshr-org-2470 232 10 employee employee NN blog-dshr-org-2470 232 11 is be VBZ blog-dshr-org-2470 232 12 like like IN blog-dshr-org-2470 232 13 the the DT blog-dshr-org-2470 232 14 event event NN blog-dshr-org-2470 232 15 - - HYPH blog-dshr-org-2470 232 16 stream stream NN blog-dshr-org-2470 232 17 hack hack NN blog-dshr-org-2470 232 18 in in IN blog-dshr-org-2470 232 19 that that DT blog-dshr-org-2470 232 20 no no DT blog-dshr-org-2470 232 21 amount amount NN blog-dshr-org-2470 232 22 of of IN blog-dshr-org-2470 232 23 transparency transparency NN blog-dshr-org-2470 232 24 would would MD blog-dshr-org-2470 232 25 have have VB blog-dshr-org-2470 232 26 prevented prevent VBN blog-dshr-org-2470 232 27 it -PRON- PRP blog-dshr-org-2470 232 28 . . . blog-dshr-org-2470 233 1 The the DT blog-dshr-org-2470 233 2 disgruntled disgruntled JJ blog-dshr-org-2470 233 3 perpetrator perpetrator NN blog-dshr-org-2470 233 4 apparently apparently RB blog-dshr-org-2470 233 5 had have VBD blog-dshr-org-2470 233 6 valid valid JJ blog-dshr-org-2470 233 7 credentials credential NNS blog-dshr-org-2470 233 8 for for IN blog-dshr-org-2470 233 9 the the DT blog-dshr-org-2470 233 10 official official JJ blog-dshr-org-2470 233 11 source source NN blog-dshr-org-2470 233 12 of of IN blog-dshr-org-2470 233 13 the the DT blog-dshr-org-2470 233 14 software software NN blog-dshr-org-2470 233 15 : : : blog-dshr-org-2470 233 16 " " `` blog-dshr-org-2470 233 17 The the DT blog-dshr-org-2470 233 18 plugin plugin NN blog-dshr-org-2470 233 19 in in IN blog-dshr-org-2470 233 20 question question NN blog-dshr-org-2470 233 21 is be VBZ blog-dshr-org-2470 233 22 WPML WPML NNP blog-dshr-org-2470 233 23 ( ( -LRB- blog-dshr-org-2470 233 24 or or CC blog-dshr-org-2470 233 25 WP WP NNP blog-dshr-org-2470 233 26 MultiLingual MultiLingual NNP blog-dshr-org-2470 233 27 ) ) -RRB- blog-dshr-org-2470 233 28 , , , blog-dshr-org-2470 233 29 the the DT blog-dshr-org-2470 233 30 most most RBS blog-dshr-org-2470 233 31 popular popular JJ blog-dshr-org-2470 233 32 WordPress WordPress NNP blog-dshr-org-2470 233 33 plugin plugin NN blog-dshr-org-2470 233 34 for for IN blog-dshr-org-2470 233 35 translating translate VBG blog-dshr-org-2470 233 36 and and CC blog-dshr-org-2470 233 37 serving serve VBG blog-dshr-org-2470 233 38 WordPress WordPress NNP blog-dshr-org-2470 233 39 sites site NNS blog-dshr-org-2470 233 40 in in IN blog-dshr-org-2470 233 41 multiple multiple JJ blog-dshr-org-2470 233 42 languages language NNS blog-dshr-org-2470 233 43 . . . blog-dshr-org-2470 234 1 According accord VBG blog-dshr-org-2470 234 2 to to IN blog-dshr-org-2470 234 3 its -PRON- PRP$ blog-dshr-org-2470 234 4 website website NN blog-dshr-org-2470 234 5 , , , blog-dshr-org-2470 234 6 WPML WPML NNP blog-dshr-org-2470 234 7 has have VBZ blog-dshr-org-2470 234 8 over over IN blog-dshr-org-2470 234 9 600,000 600,000 CD blog-dshr-org-2470 234 10 paying pay VBG blog-dshr-org-2470 234 11 customers customer NNS blog-dshr-org-2470 234 12 and and CC blog-dshr-org-2470 234 13 is be VBZ blog-dshr-org-2470 234 14 one one CD blog-dshr-org-2470 234 15 of of IN blog-dshr-org-2470 234 16 the the DT blog-dshr-org-2470 234 17 very very RB blog-dshr-org-2470 234 18 few few JJ blog-dshr-org-2470 234 19 WordPress WordPress NNP blog-dshr-org-2470 234 20 plugins plugin NNS blog-dshr-org-2470 234 21 that that WDT blog-dshr-org-2470 234 22 is be VBZ blog-dshr-org-2470 234 23 so so RB blog-dshr-org-2470 234 24 reputable reputable JJ blog-dshr-org-2470 234 25 that that IN blog-dshr-org-2470 234 26 it -PRON- PRP blog-dshr-org-2470 234 27 does do VBZ blog-dshr-org-2470 234 28 n't not RB blog-dshr-org-2470 234 29 need need VB blog-dshr-org-2470 234 30 to to TO blog-dshr-org-2470 234 31 advertise advertise VB blog-dshr-org-2470 234 32 itself -PRON- PRP blog-dshr-org-2470 234 33 with with IN blog-dshr-org-2470 234 34 a a DT blog-dshr-org-2470 234 35 free free JJ blog-dshr-org-2470 234 36 version version NN blog-dshr-org-2470 234 37 on on IN blog-dshr-org-2470 234 38 the the DT blog-dshr-org-2470 234 39 official official JJ blog-dshr-org-2470 234 40 WordPress.org WordPress.org -LRB- blog-dshr-org-2470 234 41 plugins plugin NNS blog-dshr-org-2470 234 42 repository repository NN blog-dshr-org-2470 234 43 . . . blog-dshr-org-2470 234 44 " " '' blog-dshr-org-2470 235 1 January January NNP blog-dshr-org-2470 235 2 21 21 CD blog-dshr-org-2470 235 3 , , , blog-dshr-org-2470 235 4 2019 2019 CD blog-dshr-org-2470 235 5 at at IN blog-dshr-org-2470 235 6 6:20 6:20 CD blog-dshr-org-2470 235 7 AM am NN blog-dshr-org-2470 235 8 David David NNP blog-dshr-org-2470 235 9 . . . blog-dshr-org-2470 236 1 said say VBD blog-dshr-org-2470 236 2 ... ... : blog-dshr-org-2470 237 1 The the DT blog-dshr-org-2470 237 2 fourth fourth JJ blog-dshr-org-2470 237 3 annual annual JJ blog-dshr-org-2470 237 4 report report NN blog-dshr-org-2470 237 5 for for IN blog-dshr-org-2470 237 6 the the DT blog-dshr-org-2470 237 7 National National NNP blog-dshr-org-2470 237 8 Security Security NNP blog-dshr-org-2470 237 9 Adviser Adviser NNP blog-dshr-org-2470 237 10 from from IN blog-dshr-org-2470 237 11 the the DT blog-dshr-org-2470 237 12 Huawei Huawei NNP blog-dshr-org-2470 237 13 Cyber Cyber NNP blog-dshr-org-2470 237 14 Security Security NNP blog-dshr-org-2470 237 15 Evaluation Evaluation NNP blog-dshr-org-2470 237 16 Centre Centre NNP blog-dshr-org-2470 237 17 Oversight Oversight NNP blog-dshr-org-2470 237 18 Board Board NNP blog-dshr-org-2470 237 19 in in IN blog-dshr-org-2470 237 20 the the DT blog-dshr-org-2470 237 21 UK UK NNP blog-dshr-org-2470 237 22 is be VBZ blog-dshr-org-2470 237 23 interesting interesting JJ blog-dshr-org-2470 237 24 . . . blog-dshr-org-2470 238 1 The the DT blog-dshr-org-2470 238 2 Centre Centre NNP blog-dshr-org-2470 238 3 has have VBZ blog-dshr-org-2470 238 4 access access NN blog-dshr-org-2470 238 5 to to IN blog-dshr-org-2470 238 6 the the DT blog-dshr-org-2470 238 7 source source NN blog-dshr-org-2470 238 8 code code NN blog-dshr-org-2470 238 9 for for IN blog-dshr-org-2470 238 10 Huawei Huawei NNP blog-dshr-org-2470 238 11 products product NNS blog-dshr-org-2470 238 12 , , , blog-dshr-org-2470 238 13 and and CC blog-dshr-org-2470 238 14 is be VBZ blog-dshr-org-2470 238 15 working work VBG blog-dshr-org-2470 238 16 with with IN blog-dshr-org-2470 238 17 Huawei Huawei NNP blog-dshr-org-2470 238 18 to to TO blog-dshr-org-2470 238 19 make make VB blog-dshr-org-2470 238 20 the the DT blog-dshr-org-2470 238 21 builds build NNS blog-dshr-org-2470 238 22 reproducible reproducible VB blog-dshr-org-2470 238 23 : : : blog-dshr-org-2470 238 24 " " `` blog-dshr-org-2470 238 25 3.15 3.15 CD blog-dshr-org-2470 238 26 HCSEC HCSEC NNS blog-dshr-org-2470 238 27 have have VBP blog-dshr-org-2470 238 28 worked work VBN blog-dshr-org-2470 238 29 with with IN blog-dshr-org-2470 238 30 Huawei Huawei NNP blog-dshr-org-2470 238 31 R&D R&D NNP blog-dshr-org-2470 238 32 to to TO blog-dshr-org-2470 238 33 try try VB blog-dshr-org-2470 238 34 to to TO blog-dshr-org-2470 238 35 correct correct VB blog-dshr-org-2470 238 36 the the DT blog-dshr-org-2470 238 37 deficiencies deficiency NNS blog-dshr-org-2470 238 38 in in IN blog-dshr-org-2470 238 39 the the DT blog-dshr-org-2470 238 40 underlying underlying JJ blog-dshr-org-2470 238 41 build build NN blog-dshr-org-2470 238 42 and and CC blog-dshr-org-2470 238 43 compilation compilation NN blog-dshr-org-2470 238 44 process process NN blog-dshr-org-2470 238 45 for for IN blog-dshr-org-2470 238 46 these these DT blog-dshr-org-2470 238 47 four four CD blog-dshr-org-2470 238 48 products product NNS blog-dshr-org-2470 238 49 . . . blog-dshr-org-2470 239 1 This this DT blog-dshr-org-2470 239 2 has have VBZ blog-dshr-org-2470 239 3 taken take VBN blog-dshr-org-2470 239 4 significant significant JJ blog-dshr-org-2470 239 5 effort effort NN blog-dshr-org-2470 239 6 from from IN blog-dshr-org-2470 239 7 all all DT blog-dshr-org-2470 239 8 sides side NNS blog-dshr-org-2470 239 9 and and CC blog-dshr-org-2470 239 10 has have VBZ blog-dshr-org-2470 239 11 resulted result VBN blog-dshr-org-2470 239 12 in in IN blog-dshr-org-2470 239 13 a a DT blog-dshr-org-2470 239 14 single single JJ blog-dshr-org-2470 239 15 product product NN blog-dshr-org-2470 239 16 that that WDT blog-dshr-org-2470 239 17 can can MD blog-dshr-org-2470 239 18 be be VB blog-dshr-org-2470 239 19 built build VBN blog-dshr-org-2470 239 20 repeatedly repeatedly RB blog-dshr-org-2470 239 21 from from IN blog-dshr-org-2470 239 22 source source NN blog-dshr-org-2470 239 23 to to IN blog-dshr-org-2470 239 24 the the DT blog-dshr-org-2470 239 25 General General NNP blog-dshr-org-2470 239 26 Availability Availability NNP blog-dshr-org-2470 239 27 ( ( -LRB- blog-dshr-org-2470 239 28 GA GA NNP blog-dshr-org-2470 239 29 ) ) -RRB- blog-dshr-org-2470 239 30 version version NN blog-dshr-org-2470 239 31 as as IN blog-dshr-org-2470 239 32 distributed distribute VBN blog-dshr-org-2470 239 33 . . . blog-dshr-org-2470 240 1 This this DT blog-dshr-org-2470 240 2 particular particular JJ blog-dshr-org-2470 240 3 build build NN blog-dshr-org-2470 240 4 has have VBZ blog-dshr-org-2470 240 5 yet yet RB blog-dshr-org-2470 240 6 to to TO blog-dshr-org-2470 240 7 be be VB blog-dshr-org-2470 240 8 deployed deploy VBN blog-dshr-org-2470 240 9 by by IN blog-dshr-org-2470 240 10 any any DT blog-dshr-org-2470 240 11 UK UK NNP blog-dshr-org-2470 240 12 operator operator NN blog-dshr-org-2470 240 13 , , , blog-dshr-org-2470 240 14 but but CC blog-dshr-org-2470 240 15 we -PRON- PRP blog-dshr-org-2470 240 16 expect expect VBP blog-dshr-org-2470 240 17 deployment deployment NN blog-dshr-org-2470 240 18 by by IN blog-dshr-org-2470 240 19 UK UK NNP blog-dshr-org-2470 240 20 operators operator NNS blog-dshr-org-2470 240 21 in in IN blog-dshr-org-2470 240 22 the the DT blog-dshr-org-2470 240 23 future future NN blog-dshr-org-2470 240 24 , , , blog-dshr-org-2470 240 25 as as IN blog-dshr-org-2470 240 26 part part NN blog-dshr-org-2470 240 27 of of IN blog-dshr-org-2470 240 28 their -PRON- PRP$ blog-dshr-org-2470 240 29 normal normal JJ blog-dshr-org-2470 240 30 network network NN blog-dshr-org-2470 240 31 release release NN blog-dshr-org-2470 240 32 cycle cycle NN blog-dshr-org-2470 240 33 . . . blog-dshr-org-2470 241 1 The the DT blog-dshr-org-2470 241 2 remaining remain VBG blog-dshr-org-2470 241 3 three three CD blog-dshr-org-2470 241 4 products product NNS blog-dshr-org-2470 241 5 from from IN blog-dshr-org-2470 241 6 the the DT blog-dshr-org-2470 241 7 pilot pilot NN blog-dshr-org-2470 241 8 are be VBP blog-dshr-org-2470 241 9 expected expect VBN blog-dshr-org-2470 241 10 to to TO blog-dshr-org-2470 241 11 be be VB blog-dshr-org-2470 241 12 made make VBN blog-dshr-org-2470 241 13 commercially commercially RB blog-dshr-org-2470 241 14 available available JJ blog-dshr-org-2470 241 15 in in IN blog-dshr-org-2470 241 16 2018H1 2018h1 CD blog-dshr-org-2470 241 17 , , , blog-dshr-org-2470 241 18 with with IN blog-dshr-org-2470 241 19 each each DT blog-dshr-org-2470 241 20 having have VBG blog-dshr-org-2470 241 21 reproducible reproducible NN blog-dshr-org-2470 241 22 binaries binary NNS blog-dshr-org-2470 241 23 . . . blog-dshr-org-2470 241 24 " " '' blog-dshr-org-2470 242 1 January January NNP blog-dshr-org-2470 242 2 31 31 CD blog-dshr-org-2470 242 3 , , , blog-dshr-org-2470 242 4 2019 2019 CD blog-dshr-org-2470 242 5 at at IN blog-dshr-org-2470 242 6 8:47 8:47 CD blog-dshr-org-2470 242 7 AM am NN blog-dshr-org-2470 242 8 David David NNP blog-dshr-org-2470 242 9 . . . blog-dshr-org-2470 243 1 said say VBD blog-dshr-org-2470 243 2 ... ... : blog-dshr-org-2470 243 3 Huawei Huawei NNP blog-dshr-org-2470 243 4 says say VBZ blog-dshr-org-2470 243 5 fixing fix VBG blog-dshr-org-2470 243 6 " " `` blog-dshr-org-2470 243 7 the the DT blog-dshr-org-2470 243 8 deficiencies deficiency NNS blog-dshr-org-2470 243 9 in in IN blog-dshr-org-2470 243 10 the the DT blog-dshr-org-2470 243 11 underlying underlying JJ blog-dshr-org-2470 243 12 build build NN blog-dshr-org-2470 243 13 and and CC blog-dshr-org-2470 243 14 compilation compilation NN blog-dshr-org-2470 243 15 process process NN blog-dshr-org-2470 243 16 " " '' blog-dshr-org-2470 243 17 in in IN blog-dshr-org-2470 243 18 its -PRON- PRP$ blog-dshr-org-2470 243 19 carrier carrier NN blog-dshr-org-2470 243 20 products product NNS blog-dshr-org-2470 243 21 will will MD blog-dshr-org-2470 243 22 take take VB blog-dshr-org-2470 243 23 five five CD blog-dshr-org-2470 243 24 years year NNS blog-dshr-org-2470 243 25 . . . blog-dshr-org-2470 244 1 February February NNP blog-dshr-org-2470 244 2 6 6 CD blog-dshr-org-2470 244 3 , , , blog-dshr-org-2470 244 4 2019 2019 CD blog-dshr-org-2470 244 5 at at IN blog-dshr-org-2470 244 6 7:17 7:17 CD blog-dshr-org-2470 244 7 PM PM NNP blog-dshr-org-2470 244 8 David David NNP blog-dshr-org-2470 244 9 . . . blog-dshr-org-2470 245 1 said say VBD blog-dshr-org-2470 245 2 ... ... : blog-dshr-org-2470 246 1 In in IN blog-dshr-org-2470 246 2 Cyber Cyber NNP blog-dshr-org-2470 246 3 - - HYPH blog-dshr-org-2470 246 4 Mercenary Mercenary NNP blog-dshr-org-2470 246 5 Groups group NNS blog-dshr-org-2470 246 6 Should Should MD blog-dshr-org-2470 246 7 n't not RB blog-dshr-org-2470 246 8 be be VB blog-dshr-org-2470 246 9 Trusted trust VBN blog-dshr-org-2470 246 10 in in IN blog-dshr-org-2470 246 11 Your -PRON- PRP$ blog-dshr-org-2470 246 12 Browser Browser NNP blog-dshr-org-2470 246 13 or or CC blog-dshr-org-2470 246 14 Anywhere Anywhere NNP blog-dshr-org-2470 246 15 Else Else NNP blog-dshr-org-2470 246 16 , , , blog-dshr-org-2470 246 17 the the DT blog-dshr-org-2470 246 18 EFF EFF NNP blog-dshr-org-2470 246 19 's 's POS blog-dshr-org-2470 246 20 Cooper Cooper NNP blog-dshr-org-2470 246 21 Quintin Quintin NNP blog-dshr-org-2470 246 22 describes describe VBZ blog-dshr-org-2470 246 23 the the DT blog-dshr-org-2470 246 24 latest late JJS blog-dshr-org-2470 246 25 example example NN blog-dshr-org-2470 246 26 showing show VBG blog-dshr-org-2470 246 27 why why WRB blog-dshr-org-2470 246 28 Certificate Certificate NNP blog-dshr-org-2470 246 29 Authorities Authorities NNPS blog-dshr-org-2470 246 30 ca can MD blog-dshr-org-2470 246 31 n't not RB blog-dshr-org-2470 246 32 be be VB blog-dshr-org-2470 246 33 trusted trust VBN blog-dshr-org-2470 246 34 : : : blog-dshr-org-2470 246 35 " " `` blog-dshr-org-2470 246 36 DarkMatter DarkMatter NNP blog-dshr-org-2470 246 37 , , , blog-dshr-org-2470 246 38 the the DT blog-dshr-org-2470 246 39 notorious notorious JJ blog-dshr-org-2470 246 40 cyber cyber JJ blog-dshr-org-2470 246 41 - - HYPH blog-dshr-org-2470 246 42 mercenary mercenary NN blog-dshr-org-2470 246 43 firm firm NN blog-dshr-org-2470 246 44 based base VBN blog-dshr-org-2470 246 45 in in IN blog-dshr-org-2470 246 46 the the DT blog-dshr-org-2470 246 47 United United NNP blog-dshr-org-2470 246 48 Arab Arab NNP blog-dshr-org-2470 246 49 Emirates Emirates NNP blog-dshr-org-2470 246 50 , , , blog-dshr-org-2470 246 51 is be VBZ blog-dshr-org-2470 246 52 seeking seek VBG blog-dshr-org-2470 246 53 to to TO blog-dshr-org-2470 246 54 become become VB blog-dshr-org-2470 246 55 approved approve VBN blog-dshr-org-2470 246 56 as as IN blog-dshr-org-2470 246 57 a a DT blog-dshr-org-2470 246 58 top top JJ blog-dshr-org-2470 246 59 - - HYPH blog-dshr-org-2470 246 60 level level NN blog-dshr-org-2470 246 61 certificate certificate NN blog-dshr-org-2470 246 62 authority authority NN blog-dshr-org-2470 246 63 in in IN blog-dshr-org-2470 246 64 Mozilla Mozilla NNP blog-dshr-org-2470 246 65 ’s ’s POS blog-dshr-org-2470 246 66 root root NN blog-dshr-org-2470 246 67 certificate certificate NN blog-dshr-org-2470 246 68 program program NN blog-dshr-org-2470 246 69 . . . blog-dshr-org-2470 247 1 Giving give VBG blog-dshr-org-2470 247 2 such such PDT blog-dshr-org-2470 247 3 a a DT blog-dshr-org-2470 247 4 trusted trust VBN blog-dshr-org-2470 247 5 position position NN blog-dshr-org-2470 247 6 to to IN blog-dshr-org-2470 247 7 this this DT blog-dshr-org-2470 247 8 company company NN blog-dshr-org-2470 247 9 would would MD blog-dshr-org-2470 247 10 be be VB blog-dshr-org-2470 247 11 a a DT blog-dshr-org-2470 247 12 very very RB blog-dshr-org-2470 247 13 bad bad JJ blog-dshr-org-2470 247 14 idea idea NN blog-dshr-org-2470 247 15 . . . blog-dshr-org-2470 248 1 DarkMatter DarkMatter NNP blog-dshr-org-2470 248 2 has have VBZ blog-dshr-org-2470 248 3 a a DT blog-dshr-org-2470 248 4 business business NN blog-dshr-org-2470 248 5 interest interest NN blog-dshr-org-2470 248 6 in in IN blog-dshr-org-2470 248 7 subverting subverting NN blog-dshr-org-2470 248 8 encryption encryption NN blog-dshr-org-2470 248 9 , , , blog-dshr-org-2470 248 10 and and CC blog-dshr-org-2470 248 11 would would MD blog-dshr-org-2470 248 12 be be VB blog-dshr-org-2470 248 13 able able JJ blog-dshr-org-2470 248 14 to to TO blog-dshr-org-2470 248 15 potentially potentially RB blog-dshr-org-2470 248 16 decrypt decrypt VB blog-dshr-org-2470 248 17 any any DT blog-dshr-org-2470 248 18 HTTPS HTTPS NNP blog-dshr-org-2470 248 19 traffic traffic NN blog-dshr-org-2470 248 20 they -PRON- PRP blog-dshr-org-2470 248 21 intercepted intercept VBD blog-dshr-org-2470 248 22 . . . blog-dshr-org-2470 249 1 One one CD blog-dshr-org-2470 249 2 of of IN blog-dshr-org-2470 249 3 the the DT blog-dshr-org-2470 249 4 things thing NNS blog-dshr-org-2470 249 5 HTTPS HTTPS NNP blog-dshr-org-2470 249 6 is be VBZ blog-dshr-org-2470 249 7 good good JJ blog-dshr-org-2470 249 8 at at IN blog-dshr-org-2470 249 9 is be VBZ blog-dshr-org-2470 249 10 protecting protect VBG blog-dshr-org-2470 249 11 your -PRON- PRP$ blog-dshr-org-2470 249 12 private private JJ blog-dshr-org-2470 249 13 communications communication NNS blog-dshr-org-2470 249 14 from from IN blog-dshr-org-2470 249 15 snooping snoop VBG blog-dshr-org-2470 249 16 governments government NNS blog-dshr-org-2470 249 17 — — : blog-dshr-org-2470 249 18 and and CC blog-dshr-org-2470 249 19 when when WRB blog-dshr-org-2470 249 20 governments government NNS blog-dshr-org-2470 249 21 want want VBP blog-dshr-org-2470 249 22 to to TO blog-dshr-org-2470 249 23 snoop snoop VB blog-dshr-org-2470 249 24 , , , blog-dshr-org-2470 249 25 they -PRON- PRP blog-dshr-org-2470 249 26 regularly regularly RB blog-dshr-org-2470 249 27 hire hire VBP blog-dshr-org-2470 249 28 DarkMatter DarkMatter NNP blog-dshr-org-2470 249 29 to to TO blog-dshr-org-2470 249 30 do do VB blog-dshr-org-2470 249 31 their -PRON- PRP$ blog-dshr-org-2470 249 32 dirty dirty JJ blog-dshr-org-2470 249 33 work work NN blog-dshr-org-2470 249 34 . . . blog-dshr-org-2470 250 1 ... ... NFP blog-dshr-org-2470 250 2 DarkMatter DarkMatter NNP blog-dshr-org-2470 250 3 was be VBD blog-dshr-org-2470 250 4 already already RB blog-dshr-org-2470 250 5 given give VBN blog-dshr-org-2470 250 6 an an DT blog-dshr-org-2470 250 7 " " `` blog-dshr-org-2470 250 8 intermediate intermediate JJ blog-dshr-org-2470 250 9 " " '' blog-dshr-org-2470 250 10 certificate certificate NN blog-dshr-org-2470 250 11 by by IN blog-dshr-org-2470 250 12 another another DT blog-dshr-org-2470 250 13 company company NN blog-dshr-org-2470 250 14 , , , blog-dshr-org-2470 250 15 called call VBN blog-dshr-org-2470 250 16 QuoVadis QuoVadis NNP blog-dshr-org-2470 250 17 , , , blog-dshr-org-2470 250 18 now now RB blog-dshr-org-2470 250 19 owned own VBN blog-dshr-org-2470 250 20 by by IN blog-dshr-org-2470 250 21 DigiCert DigiCert NNP blog-dshr-org-2470 250 22 . . . blog-dshr-org-2470 251 1 That that DT blog-dshr-org-2470 251 2 's be VBZ blog-dshr-org-2470 251 3 bad bad JJ blog-dshr-org-2470 251 4 enough enough RB blog-dshr-org-2470 251 5 , , , blog-dshr-org-2470 251 6 but but CC blog-dshr-org-2470 251 7 the the DT blog-dshr-org-2470 251 8 " " `` blog-dshr-org-2470 251 9 intermediate intermediate JJ blog-dshr-org-2470 251 10 " " '' blog-dshr-org-2470 251 11 authority authority NN blog-dshr-org-2470 251 12 at at IN blog-dshr-org-2470 251 13 least least JJS blog-dshr-org-2470 251 14 comes come VBZ blog-dshr-org-2470 251 15 with with IN blog-dshr-org-2470 251 16 ostensible ostensible JJ blog-dshr-org-2470 251 17 oversight oversight NN blog-dshr-org-2470 251 18 by by IN blog-dshr-org-2470 251 19 DigiCert DigiCert NNP blog-dshr-org-2470 251 20 . . . blog-dshr-org-2470 251 21 " " '' blog-dshr-org-2470 252 1 Hat hat NN blog-dshr-org-2470 252 2 tip tip NN blog-dshr-org-2470 252 3 to to IN blog-dshr-org-2470 252 4 Cory Cory NNP blog-dshr-org-2470 252 5 Doctorow Doctorow NNP blog-dshr-org-2470 252 6 . . . blog-dshr-org-2470 253 1 February February NNP blog-dshr-org-2470 253 2 23 23 CD blog-dshr-org-2470 253 3 , , , blog-dshr-org-2470 253 4 2019 2019 CD blog-dshr-org-2470 253 5 at at IN blog-dshr-org-2470 253 6 2:29 2:29 CD blog-dshr-org-2470 253 7 PM pm NN blog-dshr-org-2470 253 8 David David NNP blog-dshr-org-2470 253 9 . . . blog-dshr-org-2470 254 1 said say VBD blog-dshr-org-2470 254 2 ... ... : blog-dshr-org-2470 254 3 Gareth Gareth NNP blog-dshr-org-2470 254 4 Corfield Corfield NNP blog-dshr-org-2470 254 5 's 's POS blog-dshr-org-2470 254 6 Just Just NNP blog-dshr-org-2470 254 7 Android Android NNP blog-dshr-org-2470 254 8 things thing NNS blog-dshr-org-2470 254 9 : : : blog-dshr-org-2470 254 10 150 150 CD blog-dshr-org-2470 254 11 m m NN blog-dshr-org-2470 254 12 phones phone NNS blog-dshr-org-2470 254 13 , , , blog-dshr-org-2470 254 14 gadgets gadget VBZ blog-dshr-org-2470 254 15 installed instal VBN blog-dshr-org-2470 254 16 ' ' '' blog-dshr-org-2470 254 17 adware adware VB blog-dshr-org-2470 254 18 - - HYPH blog-dshr-org-2470 254 19 ridden ridden JJ blog-dshr-org-2470 254 20 ' ' '' blog-dshr-org-2470 254 21 mobe mobe NNP blog-dshr-org-2470 254 22 simulator simulator NNP blog-dshr-org-2470 254 23 games games NNPS blog-dshr-org-2470 254 24 reports report VBZ blog-dshr-org-2470 254 25 on on IN blog-dshr-org-2470 254 26 a a DT blog-dshr-org-2470 254 27 very very RB blog-dshr-org-2470 254 28 successful successful JJ blog-dshr-org-2470 254 29 software software NN blog-dshr-org-2470 254 30 supply supply NN blog-dshr-org-2470 254 31 chain chain NN blog-dshr-org-2470 254 32 attack attack NN blog-dshr-org-2470 254 33 : : : blog-dshr-org-2470 254 34 " " `` blog-dshr-org-2470 254 35 Android Android NNP blog-dshr-org-2470 254 36 adware adware VBP blog-dshr-org-2470 254 37 found find VBD blog-dshr-org-2470 254 38 its -PRON- PRP$ blog-dshr-org-2470 254 39 way way NN blog-dshr-org-2470 254 40 into into IN blog-dshr-org-2470 254 41 as as RB blog-dshr-org-2470 254 42 many many JJ blog-dshr-org-2470 254 43 as as IN blog-dshr-org-2470 254 44 150 150 CD blog-dshr-org-2470 254 45 million million CD blog-dshr-org-2470 254 46 devices device NNS blog-dshr-org-2470 254 47 – – : blog-dshr-org-2470 254 48 after after IN blog-dshr-org-2470 254 49 it -PRON- PRP blog-dshr-org-2470 254 50 was be VBD blog-dshr-org-2470 254 51 stashed stash VBN blog-dshr-org-2470 254 52 inside inside IN blog-dshr-org-2470 254 53 a a DT blog-dshr-org-2470 254 54 large large JJ blog-dshr-org-2470 254 55 number number NN blog-dshr-org-2470 254 56 of of IN blog-dshr-org-2470 254 57 those those DT blog-dshr-org-2470 254 58 bizarre bizarre JJ blog-dshr-org-2470 254 59 viral viral JJ blog-dshr-org-2470 254 60 mundane mundane JJ blog-dshr-org-2470 254 61 job job NN blog-dshr-org-2470 254 62 simulation simulation NN blog-dshr-org-2470 254 63 games game NNS blog-dshr-org-2470 254 64 , , , blog-dshr-org-2470 254 65 we -PRON- PRP blog-dshr-org-2470 254 66 're be VBP blog-dshr-org-2470 254 67 told tell VBN blog-dshr-org-2470 254 68 . . . blog-dshr-org-2470 255 1 ... ... NFP blog-dshr-org-2470 256 1 Although although IN blog-dshr-org-2470 256 2 researchers researcher NNS blog-dshr-org-2470 256 3 believed believe VBD blog-dshr-org-2470 256 4 that that IN blog-dshr-org-2470 256 5 the the DT blog-dshr-org-2470 256 6 titles title NNS blog-dshr-org-2470 256 7 were be VBD blog-dshr-org-2470 256 8 legitimate legitimate JJ blog-dshr-org-2470 256 9 , , , blog-dshr-org-2470 256 10 they -PRON- PRP blog-dshr-org-2470 256 11 said say VBD blog-dshr-org-2470 256 12 they -PRON- PRP blog-dshr-org-2470 256 13 thought think VBD blog-dshr-org-2470 256 14 the the DT blog-dshr-org-2470 256 15 devs dev NNS blog-dshr-org-2470 256 16 were be VBD blog-dshr-org-2470 256 17 “ " `` blog-dshr-org-2470 256 18 scammed scammed JJ blog-dshr-org-2470 256 19 ” " '' blog-dshr-org-2470 256 20 into into IN blog-dshr-org-2470 256 21 using use VBG blog-dshr-org-2470 256 22 a a DT blog-dshr-org-2470 256 23 “ " `` blog-dshr-org-2470 256 24 malicious malicious JJ blog-dshr-org-2470 256 25 SDK SDK NNP blog-dshr-org-2470 256 26 , , , blog-dshr-org-2470 256 27 unaware unaware JJ blog-dshr-org-2470 256 28 of of IN blog-dshr-org-2470 256 29 its -PRON- PRP$ blog-dshr-org-2470 256 30 content content NN blog-dshr-org-2470 256 31 , , , blog-dshr-org-2470 256 32 leading lead VBG blog-dshr-org-2470 256 33 to to IN blog-dshr-org-2470 256 34 the the DT blog-dshr-org-2470 256 35 fact fact NN blog-dshr-org-2470 256 36 that that IN blog-dshr-org-2470 256 37 this this DT blog-dshr-org-2470 256 38 campaign campaign NN blog-dshr-org-2470 256 39 was be VBD blog-dshr-org-2470 256 40 not not RB blog-dshr-org-2470 256 41 targeting target VBG blog-dshr-org-2470 256 42 a a DT blog-dshr-org-2470 256 43 specific specific JJ blog-dshr-org-2470 256 44 country country NN blog-dshr-org-2470 256 45 or or CC blog-dshr-org-2470 256 46 developed develop VBN blog-dshr-org-2470 256 47 by by IN blog-dshr-org-2470 256 48 the the DT blog-dshr-org-2470 256 49 same same JJ blog-dshr-org-2470 256 50 developer developer NN blog-dshr-org-2470 256 51 . . . blog-dshr-org-2470 256 52 ” " '' blog-dshr-org-2470 256 53 March March NNP blog-dshr-org-2470 256 54 15 15 CD blog-dshr-org-2470 256 55 , , , blog-dshr-org-2470 256 56 2019 2019 CD blog-dshr-org-2470 256 57 at at IN blog-dshr-org-2470 256 58 8:24 8:24 CD blog-dshr-org-2470 256 59 AM am NN blog-dshr-org-2470 256 60 David David NNP blog-dshr-org-2470 256 61 . . . blog-dshr-org-2470 257 1 said say VBD blog-dshr-org-2470 257 2 ... ... : blog-dshr-org-2470 257 3 Kim Kim NNP blog-dshr-org-2470 257 4 Zetter Zetter NNP blog-dshr-org-2470 257 5 's 's POS blog-dshr-org-2470 257 6 Hackers Hackers NNP blog-dshr-org-2470 257 7 Hijacked Hijacked NNP blog-dshr-org-2470 257 8 ASUS ASUS NNP blog-dshr-org-2470 257 9 Software software NN blog-dshr-org-2470 257 10 Updates Updates NNPS blog-dshr-org-2470 257 11 to to TO blog-dshr-org-2470 257 12 Install Install NNP blog-dshr-org-2470 257 13 Backdoors Backdoors NNP blog-dshr-org-2470 257 14 on on IN blog-dshr-org-2470 257 15 Thousands thousand NNS blog-dshr-org-2470 257 16 of of IN blog-dshr-org-2470 257 17 Computers Computers NNPS blog-dshr-org-2470 257 18 is be VBZ blog-dshr-org-2470 257 19 an an DT blog-dshr-org-2470 257 20 excellent excellent JJ blog-dshr-org-2470 257 21 example example NN blog-dshr-org-2470 257 22 of of IN blog-dshr-org-2470 257 23 a a DT blog-dshr-org-2470 257 24 software software NN blog-dshr-org-2470 257 25 supply supply NN blog-dshr-org-2470 257 26 chain chain NN blog-dshr-org-2470 257 27 attack attack NN blog-dshr-org-2470 257 28 : : : blog-dshr-org-2470 257 29 " " `` blog-dshr-org-2470 257 30 Researchers researcher NNS blog-dshr-org-2470 257 31 at at IN blog-dshr-org-2470 257 32 cybersecurity cybersecurity NN blog-dshr-org-2470 257 33 firm firm NN blog-dshr-org-2470 257 34 Kaspersky Kaspersky NNP blog-dshr-org-2470 257 35 Lab Lab NNP blog-dshr-org-2470 257 36 say say VBP blog-dshr-org-2470 257 37 that that IN blog-dshr-org-2470 257 38 ASUS ASUS NNP blog-dshr-org-2470 257 39 , , , blog-dshr-org-2470 257 40 one one CD blog-dshr-org-2470 257 41 of of IN blog-dshr-org-2470 257 42 the the DT blog-dshr-org-2470 257 43 world world NN blog-dshr-org-2470 257 44 ’s ’s POS blog-dshr-org-2470 257 45 largest large JJS blog-dshr-org-2470 257 46 computer computer NN blog-dshr-org-2470 257 47 makers maker NNS blog-dshr-org-2470 257 48 , , , blog-dshr-org-2470 257 49 was be VBD blog-dshr-org-2470 257 50 used use VBN blog-dshr-org-2470 257 51 to to TO blog-dshr-org-2470 257 52 unwittingly unwittingly RB blog-dshr-org-2470 257 53 install install VB blog-dshr-org-2470 257 54 a a DT blog-dshr-org-2470 257 55 malicious malicious JJ blog-dshr-org-2470 257 56 backdoor backdoor NN blog-dshr-org-2470 257 57 on on IN blog-dshr-org-2470 257 58 thousands thousand NNS blog-dshr-org-2470 257 59 of of IN blog-dshr-org-2470 257 60 its -PRON- PRP$ blog-dshr-org-2470 257 61 customers customer NNS blog-dshr-org-2470 257 62 ’ ’ POS blog-dshr-org-2470 257 63 computers computer NNS blog-dshr-org-2470 257 64 last last JJ blog-dshr-org-2470 257 65 year year NN blog-dshr-org-2470 257 66 after after IN blog-dshr-org-2470 257 67 attackers attacker NNS blog-dshr-org-2470 257 68 compromised compromise VBD blog-dshr-org-2470 257 69 a a DT blog-dshr-org-2470 257 70 server server NN blog-dshr-org-2470 257 71 for for IN blog-dshr-org-2470 257 72 the the DT blog-dshr-org-2470 257 73 company company NN blog-dshr-org-2470 257 74 ’s ’s POS blog-dshr-org-2470 257 75 live live JJ blog-dshr-org-2470 257 76 software software NN blog-dshr-org-2470 257 77 update update NN blog-dshr-org-2470 257 78 tool tool NN blog-dshr-org-2470 257 79 . . . blog-dshr-org-2470 258 1 The the DT blog-dshr-org-2470 258 2 malicious malicious JJ blog-dshr-org-2470 258 3 file file NN blog-dshr-org-2470 258 4 was be VBD blog-dshr-org-2470 258 5 signed sign VBN blog-dshr-org-2470 258 6 with with IN blog-dshr-org-2470 258 7 legitimate legitimate JJ blog-dshr-org-2470 258 8 ASUS ASUS NNP blog-dshr-org-2470 258 9 digital digital JJ blog-dshr-org-2470 258 10 certificates certificate NNS blog-dshr-org-2470 258 11 to to TO blog-dshr-org-2470 258 12 make make VB blog-dshr-org-2470 258 13 it -PRON- PRP blog-dshr-org-2470 258 14 appear appear VB blog-dshr-org-2470 258 15 to to TO blog-dshr-org-2470 258 16 be be VB blog-dshr-org-2470 258 17 an an DT blog-dshr-org-2470 258 18 authentic authentic JJ blog-dshr-org-2470 258 19 software software NN blog-dshr-org-2470 258 20 update update NN blog-dshr-org-2470 258 21 from from IN blog-dshr-org-2470 258 22 the the DT blog-dshr-org-2470 258 23 company company NN blog-dshr-org-2470 258 24 , , , blog-dshr-org-2470 258 25 Kaspersky Kaspersky NNP blog-dshr-org-2470 258 26 Lab Lab NNP blog-dshr-org-2470 258 27 says say VBZ blog-dshr-org-2470 258 28 . . . blog-dshr-org-2470 258 29 " " '' blog-dshr-org-2470 259 1 March March NNP blog-dshr-org-2470 259 2 25 25 CD blog-dshr-org-2470 259 3 , , , blog-dshr-org-2470 259 4 2019 2019 CD blog-dshr-org-2470 259 5 at at IN blog-dshr-org-2470 259 6 10:21 10:21 CD blog-dshr-org-2470 259 7 AM am NN blog-dshr-org-2470 259 8 David David NNP blog-dshr-org-2470 259 9 . . . blog-dshr-org-2470 260 1 said say VBD blog-dshr-org-2470 260 2 ... ... : blog-dshr-org-2470 260 3 Sean Sean NNP blog-dshr-org-2470 260 4 Gallagher Gallagher NNP blog-dshr-org-2470 260 5 's 's POS blog-dshr-org-2470 260 6 UK UK NNP blog-dshr-org-2470 260 7 cyber cyber JJ blog-dshr-org-2470 260 8 security security NN blog-dshr-org-2470 260 9 officials official NNS blog-dshr-org-2470 260 10 report report VBP blog-dshr-org-2470 260 11 Huawei Huawei NNP blog-dshr-org-2470 260 12 ’s ’s POS blog-dshr-org-2470 260 13 security security NN blog-dshr-org-2470 260 14 practices practice NNS blog-dshr-org-2470 260 15 are be VBP blog-dshr-org-2470 260 16 a a DT blog-dshr-org-2470 260 17 mess mess NN blog-dshr-org-2470 260 18 reports report NNS blog-dshr-org-2470 260 19 on on IN blog-dshr-org-2470 260 20 the the DT blog-dshr-org-2470 260 21 latest late JJS blog-dshr-org-2470 260 22 report report NN blog-dshr-org-2470 260 23 from from IN blog-dshr-org-2470 260 24 the the DT blog-dshr-org-2470 260 25 HCSEC HCSEC NNP blog-dshr-org-2470 260 26 Oversight Oversight NNP blog-dshr-org-2470 260 27 Board Board NNP blog-dshr-org-2470 260 28 . . . blog-dshr-org-2470 261 1 They -PRON- PRP blog-dshr-org-2470 261 2 still still RB blog-dshr-org-2470 261 3 ca can MD blog-dshr-org-2470 261 4 n't not RB blog-dshr-org-2470 261 5 do do VB blog-dshr-org-2470 261 6 reproducible reproducible VB blog-dshr-org-2470 261 7 builds build VBZ blog-dshr-org-2470 261 8 : : : blog-dshr-org-2470 261 9 " " `` blog-dshr-org-2470 261 10 HCSEC HCSEC NNP blog-dshr-org-2470 261 11 reported report VBD blog-dshr-org-2470 261 12 that that IN blog-dshr-org-2470 261 13 the the DT blog-dshr-org-2470 261 14 software software NN blog-dshr-org-2470 261 15 build build VBP blog-dshr-org-2470 261 16 process process NN blog-dshr-org-2470 261 17 used use VBN blog-dshr-org-2470 261 18 by by IN blog-dshr-org-2470 261 19 Huawei Huawei NNP blog-dshr-org-2470 261 20 results result NNS blog-dshr-org-2470 261 21 in in IN blog-dshr-org-2470 261 22 inconsistencies inconsistency NNS blog-dshr-org-2470 261 23 between between IN blog-dshr-org-2470 261 24 software software NN blog-dshr-org-2470 261 25 images image NNS blog-dshr-org-2470 261 26 . . . blog-dshr-org-2470 262 1 In in IN blog-dshr-org-2470 262 2 other other JJ blog-dshr-org-2470 262 3 words word NNS blog-dshr-org-2470 262 4 , , , blog-dshr-org-2470 262 5 products product NNS blog-dshr-org-2470 262 6 ship ship VBP blog-dshr-org-2470 262 7 with with IN blog-dshr-org-2470 262 8 software software NN blog-dshr-org-2470 262 9 with with IN blog-dshr-org-2470 262 10 widely widely RB blog-dshr-org-2470 262 11 varying vary VBG blog-dshr-org-2470 262 12 fingerprints fingerprint NNS blog-dshr-org-2470 262 13 , , , blog-dshr-org-2470 262 14 so so CC blog-dshr-org-2470 262 15 it -PRON- PRP blog-dshr-org-2470 262 16 ’s ’ VBZ blog-dshr-org-2470 262 17 impossible impossible JJ blog-dshr-org-2470 262 18 to to TO blog-dshr-org-2470 262 19 determine determine VB blog-dshr-org-2470 262 20 whether whether IN blog-dshr-org-2470 262 21 the the DT blog-dshr-org-2470 262 22 code code NN blog-dshr-org-2470 262 23 is be VBZ blog-dshr-org-2470 262 24 the the DT blog-dshr-org-2470 262 25 same same JJ blog-dshr-org-2470 262 26 based base VBN blog-dshr-org-2470 262 27 on on IN blog-dshr-org-2470 262 28 checksums checksum NNS blog-dshr-org-2470 262 29 . . . blog-dshr-org-2470 262 30 " " '' blog-dshr-org-2470 263 1 Which which WDT blog-dshr-org-2470 263 2 is be VBZ blog-dshr-org-2470 263 3 n't not RB blog-dshr-org-2470 263 4 a a DT blog-dshr-org-2470 263 5 surprise surprise NN blog-dshr-org-2470 263 6 , , , blog-dshr-org-2470 263 7 Huawei Huawei NNP blog-dshr-org-2470 263 8 already already RB blog-dshr-org-2470 263 9 said say VBD blog-dshr-org-2470 263 10 it -PRON- PRP blog-dshr-org-2470 263 11 'd 'd MD blog-dshr-org-2470 263 12 take take VB blog-dshr-org-2470 263 13 another another DT blog-dshr-org-2470 263 14 5 5 CD blog-dshr-org-2470 263 15 years year NNS blog-dshr-org-2470 263 16 . . . blog-dshr-org-2470 264 1 But but CC blog-dshr-org-2470 264 2 I -PRON- PRP blog-dshr-org-2470 264 3 'd 'd MD blog-dshr-org-2470 264 4 be be VB blog-dshr-org-2470 264 5 more more RBR blog-dshr-org-2470 264 6 concerned concerned JJ blog-dshr-org-2470 264 7 that that IN blog-dshr-org-2470 264 8 : : : blog-dshr-org-2470 264 9 " " `` blog-dshr-org-2470 264 10 One one CD blog-dshr-org-2470 264 11 major major JJ blog-dshr-org-2470 264 12 problem problem NN blog-dshr-org-2470 264 13 cited cite VBN blog-dshr-org-2470 264 14 by by IN blog-dshr-org-2470 264 15 the the DT blog-dshr-org-2470 264 16 report report NN blog-dshr-org-2470 264 17 is be VBZ blog-dshr-org-2470 264 18 that that IN blog-dshr-org-2470 264 19 a a DT blog-dshr-org-2470 264 20 large large JJ blog-dshr-org-2470 264 21 portion portion NN blog-dshr-org-2470 264 22 of of IN blog-dshr-org-2470 264 23 Huawei Huawei NNP blog-dshr-org-2470 264 24 ’s ’s POS blog-dshr-org-2470 264 25 network network NN blog-dshr-org-2470 264 26 gear gear NN blog-dshr-org-2470 264 27 still still RB blog-dshr-org-2470 264 28 relies rely VBZ blog-dshr-org-2470 264 29 on on IN blog-dshr-org-2470 264 30 version version NN blog-dshr-org-2470 264 31 5.5 5.5 CD blog-dshr-org-2470 264 32 of of IN blog-dshr-org-2470 264 33 Wind Wind NNP blog-dshr-org-2470 264 34 River River NNP blog-dshr-org-2470 264 35 ’s ’s POS blog-dshr-org-2470 264 36 VxWorks VxWorks NNP blog-dshr-org-2470 264 37 real real JJ blog-dshr-org-2470 264 38 - - HYPH blog-dshr-org-2470 264 39 time time NN blog-dshr-org-2470 264 40 operating operating NN blog-dshr-org-2470 264 41 system system NN blog-dshr-org-2470 264 42 ( ( -LRB- blog-dshr-org-2470 264 43 RTOS RTOS NNP blog-dshr-org-2470 264 44 ) ) -RRB- blog-dshr-org-2470 264 45 , , , blog-dshr-org-2470 264 46 which which WDT blog-dshr-org-2470 264 47 has have VBZ blog-dshr-org-2470 264 48 reached reach VBN blog-dshr-org-2470 264 49 its -PRON- PRP$ blog-dshr-org-2470 264 50 “ " `` blog-dshr-org-2470 264 51 end end NN blog-dshr-org-2470 264 52 of of IN blog-dshr-org-2470 264 53 life life NN blog-dshr-org-2470 264 54 ” " '' blog-dshr-org-2470 264 55 and and CC blog-dshr-org-2470 264 56 will will MD blog-dshr-org-2470 264 57 soon soon RB blog-dshr-org-2470 264 58 no no RB blog-dshr-org-2470 264 59 longer longer RB blog-dshr-org-2470 264 60 be be VB blog-dshr-org-2470 264 61 supported support VBN blog-dshr-org-2470 264 62 . . . blog-dshr-org-2470 265 1 Huawei Huawei NNP blog-dshr-org-2470 265 2 has have VBZ blog-dshr-org-2470 265 3 bought buy VBN blog-dshr-org-2470 265 4 a a DT blog-dshr-org-2470 265 5 premium premium JJ blog-dshr-org-2470 265 6 long long JJ blog-dshr-org-2470 265 7 - - HYPH blog-dshr-org-2470 265 8 term term NN blog-dshr-org-2470 265 9 support support NN blog-dshr-org-2470 265 10 license license NN blog-dshr-org-2470 265 11 from from IN blog-dshr-org-2470 265 12 VxWorks VxWorks NNP blog-dshr-org-2470 265 13 , , , blog-dshr-org-2470 265 14 but but CC blog-dshr-org-2470 265 15 that that DT blog-dshr-org-2470 265 16 support support NN blog-dshr-org-2470 265 17 runs run VBZ blog-dshr-org-2470 265 18 out out RP blog-dshr-org-2470 265 19 in in IN blog-dshr-org-2470 265 20 2020 2020 CD blog-dshr-org-2470 265 21 . . . blog-dshr-org-2470 265 22 " " '' blog-dshr-org-2470 266 1 And and CC blog-dshr-org-2470 266 2 Huawei Huawei NNP blog-dshr-org-2470 266 3 is be VBZ blog-dshr-org-2470 266 4 rolling roll VBG blog-dshr-org-2470 266 5 its -PRON- PRP$ blog-dshr-org-2470 266 6 own own JJ blog-dshr-org-2470 266 7 RTOS rtos NN blog-dshr-org-2470 266 8 based base VBN blog-dshr-org-2470 266 9 on on IN blog-dshr-org-2470 266 10 Linux Linux NNP blog-dshr-org-2470 266 11 . . . blog-dshr-org-2470 267 1 What what WP blog-dshr-org-2470 267 2 could could MD blog-dshr-org-2470 267 3 possibly possibly RB blog-dshr-org-2470 267 4 go go VB blog-dshr-org-2470 267 5 wrong wrong JJ blog-dshr-org-2470 267 6 ? ? . blog-dshr-org-2470 268 1 March March NNP blog-dshr-org-2470 268 2 28 28 CD blog-dshr-org-2470 268 3 , , , blog-dshr-org-2470 268 4 2019 2019 CD blog-dshr-org-2470 268 5 at at IN blog-dshr-org-2470 268 6 1:29 1:29 CD blog-dshr-org-2470 268 7 PM PM NNP blog-dshr-org-2470 268 8 David David NNP blog-dshr-org-2470 268 9 . . . blog-dshr-org-2470 269 1 said say VBD blog-dshr-org-2470 269 2 ... ... : blog-dshr-org-2470 270 1 The the DT blog-dshr-org-2470 270 2 latest late JJS blog-dshr-org-2470 270 3 software software NN blog-dshr-org-2470 270 4 supply supply NN blog-dshr-org-2470 270 5 chain chain NN blog-dshr-org-2470 270 6 attack attack NN blog-dshr-org-2470 270 7 victim victim NN blog-dshr-org-2470 270 8 is be VBZ blog-dshr-org-2470 270 9 bootstrap bootstrap NN blog-dshr-org-2470 270 10 - - HYPH blog-dshr-org-2470 270 11 sass sass NN blog-dshr-org-2470 270 12 via via IN blog-dshr-org-2470 270 13 RubyGems RubyGems NNP blog-dshr-org-2470 270 14 , , , blog-dshr-org-2470 270 15 with with IN blog-dshr-org-2470 270 16 about about RB blog-dshr-org-2470 270 17 28 28 CD blog-dshr-org-2470 270 18 M m CD blog-dshr-org-2470 270 19 downloads download NNS blog-dshr-org-2470 270 20 . . . blog-dshr-org-2470 271 1 April April NNP blog-dshr-org-2470 271 2 6 6 CD blog-dshr-org-2470 271 3 , , , blog-dshr-org-2470 271 4 2019 2019 CD blog-dshr-org-2470 271 5 at at IN blog-dshr-org-2470 271 6 7:20 7:20 CD blog-dshr-org-2470 271 7 AM am NN blog-dshr-org-2470 271 8 David David NNP blog-dshr-org-2470 271 9 . . . blog-dshr-org-2470 272 1 said say VBD blog-dshr-org-2470 272 2 ... ... : blog-dshr-org-2470 273 1 It -PRON- PRP blog-dshr-org-2470 273 2 turns turn VBZ blog-dshr-org-2470 273 3 out out RP blog-dshr-org-2470 273 4 that that IN blog-dshr-org-2470 273 5 ShadowHammer ShadowHammer NNP blog-dshr-org-2470 273 6 Targets Targets NNP blog-dshr-org-2470 273 7 Multiple Multiple NNP blog-dshr-org-2470 273 8 Companies Companies NNPS blog-dshr-org-2470 273 9 , , , blog-dshr-org-2470 273 10 ASUS ASUS NNP blog-dshr-org-2470 273 11 Just just RB blog-dshr-org-2470 273 12 One one CD blog-dshr-org-2470 273 13 of of IN blog-dshr-org-2470 273 14 Them -PRON- PRP blog-dshr-org-2470 273 15 : : : blog-dshr-org-2470 273 16 " " `` blog-dshr-org-2470 273 17 ASUS ASUS NNP blog-dshr-org-2470 273 18 was be VBD blog-dshr-org-2470 273 19 not not RB blog-dshr-org-2470 273 20 the the DT blog-dshr-org-2470 273 21 only only JJ blog-dshr-org-2470 273 22 company company NN blog-dshr-org-2470 273 23 targeted target VBN blog-dshr-org-2470 273 24 by by IN blog-dshr-org-2470 273 25 supply supply NN blog-dshr-org-2470 273 26 - - HYPH blog-dshr-org-2470 273 27 chain chain NN blog-dshr-org-2470 273 28 attacks attack NNS blog-dshr-org-2470 273 29 during during IN blog-dshr-org-2470 273 30 the the DT blog-dshr-org-2470 273 31 ShadowHammer ShadowHammer NNP blog-dshr-org-2470 273 32 hacking hack VBG blog-dshr-org-2470 273 33 operation operation NN blog-dshr-org-2470 273 34 as as IN blog-dshr-org-2470 273 35 discovered discover VBN blog-dshr-org-2470 273 36 by by IN blog-dshr-org-2470 273 37 Kaspersky Kaspersky NNP blog-dshr-org-2470 273 38 , , , blog-dshr-org-2470 273 39 with with IN blog-dshr-org-2470 273 40 at at RB blog-dshr-org-2470 273 41 least least JJS blog-dshr-org-2470 273 42 six six CD blog-dshr-org-2470 273 43 other other JJ blog-dshr-org-2470 273 44 organizations organization NNS blog-dshr-org-2470 273 45 having have VBG blog-dshr-org-2470 273 46 been be VBN blog-dshr-org-2470 273 47 infiltrated infiltrate VBN blog-dshr-org-2470 273 48 by by IN blog-dshr-org-2470 273 49 the the DT blog-dshr-org-2470 273 50 attackers attacker NNS blog-dshr-org-2470 273 51 . . . blog-dshr-org-2470 274 1 As as IN blog-dshr-org-2470 274 2 further further RB blog-dshr-org-2470 274 3 found find VBN blog-dshr-org-2470 274 4 out out RP blog-dshr-org-2470 274 5 by by IN blog-dshr-org-2470 274 6 Kaspersky Kaspersky NNP blog-dshr-org-2470 274 7 's 's POS blog-dshr-org-2470 274 8 security security NN blog-dshr-org-2470 274 9 researchers researcher NNS blog-dshr-org-2470 274 10 , , , blog-dshr-org-2470 274 11 ASUS ASUS NNP blog-dshr-org-2470 274 12 ' ' POS blog-dshr-org-2470 274 13 supply supply NN blog-dshr-org-2470 274 14 chain chain NN blog-dshr-org-2470 274 15 was be VBD blog-dshr-org-2470 274 16 successfully successfully RB blog-dshr-org-2470 274 17 compromised compromise VBN blog-dshr-org-2470 274 18 by by IN blog-dshr-org-2470 274 19 trojanizing trojanize VBG blog-dshr-org-2470 274 20 one one CD blog-dshr-org-2470 274 21 of of IN blog-dshr-org-2470 274 22 the the DT blog-dshr-org-2470 274 23 company company NN blog-dshr-org-2470 274 24 's 's POS blog-dshr-org-2470 274 25 notebook notebook NN blog-dshr-org-2470 274 26 software software NN blog-dshr-org-2470 274 27 updaters updater NNS blog-dshr-org-2470 274 28 named name VBN blog-dshr-org-2470 274 29 ASUS ASUS NNP blog-dshr-org-2470 274 30 Live Live NNP blog-dshr-org-2470 274 31 Updater Updater NNP blog-dshr-org-2470 274 32 which which WDT blog-dshr-org-2470 274 33 eventually eventually RB blog-dshr-org-2470 274 34 was be VBD blog-dshr-org-2470 274 35 downloaded download VBN blog-dshr-org-2470 274 36 and and CC blog-dshr-org-2470 274 37 installed instal VBN blog-dshr-org-2470 274 38 on on IN blog-dshr-org-2470 274 39 the the DT blog-dshr-org-2470 274 40 computers computer NNS blog-dshr-org-2470 274 41 of of IN blog-dshr-org-2470 274 42 tens ten NNS blog-dshr-org-2470 274 43 of of IN blog-dshr-org-2470 274 44 thousands thousand NNS blog-dshr-org-2470 274 45 of of IN blog-dshr-org-2470 274 46 customers customer NNS blog-dshr-org-2470 274 47 according accord VBG blog-dshr-org-2470 274 48 to to IN blog-dshr-org-2470 274 49 experts expert NNS blog-dshr-org-2470 274 50 ' ' POS blog-dshr-org-2470 274 51 estimations estimation NNS blog-dshr-org-2470 274 52 . . . blog-dshr-org-2470 274 53 " " '' blog-dshr-org-2470 275 1 April April NNP blog-dshr-org-2470 275 2 23 23 CD blog-dshr-org-2470 275 3 , , , blog-dshr-org-2470 275 4 2019 2019 CD blog-dshr-org-2470 275 5 at at IN blog-dshr-org-2470 275 6 5:45 5:45 CD blog-dshr-org-2470 275 7 PM pm NN blog-dshr-org-2470 275 8 David David NNP blog-dshr-org-2470 275 9 . . . blog-dshr-org-2470 276 1 said say VBD blog-dshr-org-2470 276 2 ... ... . blog-dshr-org-2470 276 3 Who who WP blog-dshr-org-2470 276 4 Owns own VBZ blog-dshr-org-2470 276 5 Huawei Huawei NNP blog-dshr-org-2470 276 6 ? ? . blog-dshr-org-2470 277 1 by by IN blog-dshr-org-2470 277 2 Christopher Christopher NNP blog-dshr-org-2470 277 3 Balding Balding NNP blog-dshr-org-2470 277 4 and and CC blog-dshr-org-2470 277 5 Donald Donald NNP blog-dshr-org-2470 277 6 C. C. NNP blog-dshr-org-2470 277 7 Clarke Clarke NNP blog-dshr-org-2470 277 8 concludes conclude VBZ blog-dshr-org-2470 277 9 that that DT blog-dshr-org-2470 277 10 : : : blog-dshr-org-2470 277 11 " " `` blog-dshr-org-2470 277 12 Huawei Huawei NNP blog-dshr-org-2470 277 13 calls call VBZ blog-dshr-org-2470 277 14 itself -PRON- PRP blog-dshr-org-2470 277 15 “ " `` blog-dshr-org-2470 277 16 employee employee NN blog-dshr-org-2470 277 17 - - HYPH blog-dshr-org-2470 277 18 owned own VBN blog-dshr-org-2470 277 19 , , , blog-dshr-org-2470 277 20 ” " '' blog-dshr-org-2470 277 21 but but CC blog-dshr-org-2470 277 22 this this DT blog-dshr-org-2470 277 23 claim claim NN blog-dshr-org-2470 277 24 is be VBZ blog-dshr-org-2470 277 25 questionable questionable JJ blog-dshr-org-2470 277 26 , , , blog-dshr-org-2470 277 27 and and CC blog-dshr-org-2470 277 28 the the DT blog-dshr-org-2470 277 29 corporate corporate JJ blog-dshr-org-2470 277 30 structure structure NN blog-dshr-org-2470 277 31 described describe VBN blog-dshr-org-2470 277 32 on on IN blog-dshr-org-2470 277 33 its -PRON- PRP$ blog-dshr-org-2470 277 34 website website NN blog-dshr-org-2470 277 35 is be VBZ blog-dshr-org-2470 277 36 misleading misleading JJ blog-dshr-org-2470 277 37 . . . blog-dshr-org-2470 277 38 " " '' blog-dshr-org-2470 278 1 April April NNP blog-dshr-org-2470 278 2 27 27 CD blog-dshr-org-2470 278 3 , , , blog-dshr-org-2470 278 4 2019 2019 CD blog-dshr-org-2470 278 5 at at IN blog-dshr-org-2470 278 6 1:56 1:56 CD blog-dshr-org-2470 278 7 PM pm NN blog-dshr-org-2470 278 8 David David NNP blog-dshr-org-2470 278 9 . . . blog-dshr-org-2470 279 1 said say VBD blog-dshr-org-2470 279 2 ... ... : blog-dshr-org-2470 279 3 David David NNP blog-dshr-org-2470 279 4 A. A. NNP blog-dshr-org-2470 279 5 Wheeler Wheeler NNP blog-dshr-org-2470 279 6 reports report VBZ blog-dshr-org-2470 279 7 on on IN blog-dshr-org-2470 279 8 another another DT blog-dshr-org-2470 279 9 not not RB blog-dshr-org-2470 279 10 - - HYPH blog-dshr-org-2470 279 11 very very RB blog-dshr-org-2470 279 12 - - HYPH blog-dshr-org-2470 279 13 successful successful JJ blog-dshr-org-2470 279 14 software software NN blog-dshr-org-2470 279 15 supply supply NN blog-dshr-org-2470 279 16 chain chain NN blog-dshr-org-2470 279 17 attack attack NN blog-dshr-org-2470 279 18 : : : blog-dshr-org-2470 279 19 " " `` blog-dshr-org-2470 279 20 A a DT blog-dshr-org-2470 279 21 malicious malicious JJ blog-dshr-org-2470 279 22 backdoor backdoor NN blog-dshr-org-2470 279 23 has have VBZ blog-dshr-org-2470 279 24 been be VBN blog-dshr-org-2470 279 25 found find VBN blog-dshr-org-2470 279 26 in in IN blog-dshr-org-2470 279 27 the the DT blog-dshr-org-2470 279 28 popular popular JJ blog-dshr-org-2470 279 29 open open JJ blog-dshr-org-2470 279 30 source source NN blog-dshr-org-2470 279 31 software software NN blog-dshr-org-2470 279 32 library library NN blog-dshr-org-2470 279 33 bootstrap bootstrap NN blog-dshr-org-2470 279 34 - - HYPH blog-dshr-org-2470 279 35 sass sass NN blog-dshr-org-2470 279 36 . . . blog-dshr-org-2470 280 1 This this DT blog-dshr-org-2470 280 2 was be VBD blog-dshr-org-2470 280 3 done do VBN blog-dshr-org-2470 280 4 by by IN blog-dshr-org-2470 280 5 someone someone NN blog-dshr-org-2470 280 6 who who WP blog-dshr-org-2470 280 7 created create VBD blog-dshr-org-2470 280 8 an an DT blog-dshr-org-2470 280 9 unauthorized unauthorized JJ blog-dshr-org-2470 280 10 updated update VBN blog-dshr-org-2470 280 11 version version NN blog-dshr-org-2470 280 12 of of IN blog-dshr-org-2470 280 13 the the DT blog-dshr-org-2470 280 14 software software NN blog-dshr-org-2470 280 15 on on IN blog-dshr-org-2470 280 16 the the DT blog-dshr-org-2470 280 17 RubyGems RubyGems NNP blog-dshr-org-2470 280 18 software software NN blog-dshr-org-2470 280 19 hosting host VBG blog-dshr-org-2470 280 20 site site NN blog-dshr-org-2470 280 21 . . . blog-dshr-org-2470 281 1 The the DT blog-dshr-org-2470 281 2 good good JJ blog-dshr-org-2470 281 3 news news NN blog-dshr-org-2470 281 4 is be VBZ blog-dshr-org-2470 281 5 that that IN blog-dshr-org-2470 281 6 it -PRON- PRP blog-dshr-org-2470 281 7 was be VBD blog-dshr-org-2470 281 8 quickly quickly RB blog-dshr-org-2470 281 9 detected detect VBN blog-dshr-org-2470 281 10 ( ( -LRB- blog-dshr-org-2470 281 11 within within IN blog-dshr-org-2470 281 12 the the DT blog-dshr-org-2470 281 13 day day NN blog-dshr-org-2470 281 14 ) ) -RRB- blog-dshr-org-2470 281 15 and and CC blog-dshr-org-2470 281 16 updated update VBN blog-dshr-org-2470 281 17 , , , blog-dshr-org-2470 281 18 and and CC blog-dshr-org-2470 281 19 that that DT blog-dshr-org-2470 281 20 limited limit VBD blog-dshr-org-2470 281 21 the the DT blog-dshr-org-2470 281 22 impact impact NN blog-dshr-org-2470 281 23 of of IN blog-dshr-org-2470 281 24 this this DT blog-dshr-org-2470 281 25 subversion subversion NN blog-dshr-org-2470 281 26 . . . blog-dshr-org-2470 282 1 The the DT blog-dshr-org-2470 282 2 backdoored backdoore VBN blog-dshr-org-2470 282 3 version version NN blog-dshr-org-2470 282 4 ( ( -LRB- blog-dshr-org-2470 282 5 3.2.0.3 3.2.0.3 CD blog-dshr-org-2470 282 6 ) ) -RRB- blog-dshr-org-2470 282 7 was be VBD blog-dshr-org-2470 282 8 only only RB blog-dshr-org-2470 282 9 downloaded download VBN blog-dshr-org-2470 282 10 1,477 1,477 CD blog-dshr-org-2470 282 11 times time NNS blog-dshr-org-2470 282 12 . . . blog-dshr-org-2470 283 1 For for IN blog-dshr-org-2470 283 2 comparison comparison NN blog-dshr-org-2470 283 3 , , , blog-dshr-org-2470 283 4 as as IN blog-dshr-org-2470 283 5 of of IN blog-dshr-org-2470 283 6 April April NNP blog-dshr-org-2470 283 7 2019 2019 CD blog-dshr-org-2470 283 8 the the DT blog-dshr-org-2470 283 9 previous previous JJ blog-dshr-org-2470 283 10 version version NN blog-dshr-org-2470 283 11 in in IN blog-dshr-org-2470 283 12 that that DT blog-dshr-org-2470 283 13 branch branch NN blog-dshr-org-2470 283 14 ( ( -LRB- blog-dshr-org-2470 283 15 3.2.0.2 3.2.0.2 CD blog-dshr-org-2470 283 16 ) ) -RRB- blog-dshr-org-2470 283 17 was be VBD blog-dshr-org-2470 283 18 downloaded download VBN blog-dshr-org-2470 283 19 1.2 1.2 CD blog-dshr-org-2470 283 20 million million CD blog-dshr-org-2470 283 21 times time NNS blog-dshr-org-2470 283 22 , , , blog-dshr-org-2470 283 23 and and CC blog-dshr-org-2470 283 24 the the DT blog-dshr-org-2470 283 25 following follow VBG blog-dshr-org-2470 283 26 version version NN blog-dshr-org-2470 283 27 3.2.0.4 3.2.0.4 CD blog-dshr-org-2470 283 28 ( ( -LRB- blog-dshr-org-2470 283 29 which which WDT blog-dshr-org-2470 283 30 duplicated duplicate VBD blog-dshr-org-2470 283 31 3.2.0.2 3.2.0.2 CD blog-dshr-org-2470 283 32 ) ) -RRB- blog-dshr-org-2470 283 33 was be VBD blog-dshr-org-2470 283 34 downloaded download VBN blog-dshr-org-2470 283 35 1,700 1,700 CD blog-dshr-org-2470 283 36 times time NNS blog-dshr-org-2470 283 37 ( ( -LRB- blog-dshr-org-2470 283 38 that that DT blog-dshr-org-2470 283 39 ’s ’ VBZ blog-dshr-org-2470 283 40 more more JJR blog-dshr-org-2470 283 41 than than IN blog-dshr-org-2470 283 42 the the DT blog-dshr-org-2470 283 43 subverted subvert VBN blog-dshr-org-2470 283 44 version version NN blog-dshr-org-2470 283 45 ! ! . blog-dshr-org-2470 283 46 ) ) -RRB- blog-dshr-org-2470 283 47 . . . blog-dshr-org-2470 284 1 So so CC blog-dshr-org-2470 284 2 it -PRON- PRP blog-dshr-org-2470 284 3 is be VBZ blog-dshr-org-2470 284 4 likely likely JJ blog-dshr-org-2470 284 5 that that IN blog-dshr-org-2470 284 6 almost almost RB blog-dshr-org-2470 284 7 all all DT blog-dshr-org-2470 284 8 subverted subvert VBN blog-dshr-org-2470 284 9 systems system NNS blog-dshr-org-2470 284 10 have have VBP blog-dshr-org-2470 284 11 already already RB blog-dshr-org-2470 284 12 been be VBN blog-dshr-org-2470 284 13 fixed fix VBN blog-dshr-org-2470 284 14 . . . blog-dshr-org-2470 284 15 " " '' blog-dshr-org-2470 285 1 Wheeler Wheeler NNP blog-dshr-org-2470 285 2 has have VBZ blog-dshr-org-2470 285 3 three three CD blog-dshr-org-2470 285 4 lessons lesson NNS blog-dshr-org-2470 285 5 from from IN blog-dshr-org-2470 285 6 this this DT blog-dshr-org-2470 285 7 : : : blog-dshr-org-2470 285 8 1 1 LS blog-dshr-org-2470 285 9 . . . blog-dshr-org-2470 286 1 Maintainers maintainer NNS blog-dshr-org-2470 286 2 need need VBP blog-dshr-org-2470 286 3 2FA 2fa CD blog-dshr-org-2470 286 4 . . . blog-dshr-org-2470 287 1 2 2 LS blog-dshr-org-2470 287 2 . . . blog-dshr-org-2470 288 1 Do do VB blog-dshr-org-2470 288 2 n't not RB blog-dshr-org-2470 288 3 update update VB blog-dshr-org-2470 288 4 your -PRON- PRP$ blog-dshr-org-2470 288 5 dependencies dependency NNS blog-dshr-org-2470 288 6 in in IN blog-dshr-org-2470 288 7 the the DT blog-dshr-org-2470 288 8 same same JJ blog-dshr-org-2470 288 9 day day NN blog-dshr-org-2470 288 10 they -PRON- PRP blog-dshr-org-2470 288 11 're be VBP blog-dshr-org-2470 288 12 released release VBN blog-dshr-org-2470 288 13 . . . blog-dshr-org-2470 289 1 3 3 LS blog-dshr-org-2470 289 2 . . . blog-dshr-org-2470 290 1 Reproducible Reproducible NNP blog-dshr-org-2470 290 2 builds build VBZ blog-dshr-org-2470 290 3 ! ! . blog-dshr-org-2470 291 1 May May NNP blog-dshr-org-2470 291 2 2 2 CD blog-dshr-org-2470 291 3 , , , blog-dshr-org-2470 291 4 2019 2019 CD blog-dshr-org-2470 291 5 at at IN blog-dshr-org-2470 291 6 9:43 9:43 CD blog-dshr-org-2470 291 7 AM am NN blog-dshr-org-2470 291 8 David David NNP blog-dshr-org-2470 291 9 . . . blog-dshr-org-2470 292 1 said say VBD blog-dshr-org-2470 292 2 ... ... : blog-dshr-org-2470 292 3 Andy Andy NNP blog-dshr-org-2470 292 4 Greenberg Greenberg NNP blog-dshr-org-2470 292 5 's 's POS blog-dshr-org-2470 292 6 A a DT blog-dshr-org-2470 292 7 mysterious mysterious JJ blog-dshr-org-2470 292 8 hacker hacker NN blog-dshr-org-2470 292 9 gang gang NN blog-dshr-org-2470 292 10 is be VBZ blog-dshr-org-2470 292 11 on on IN blog-dshr-org-2470 292 12 a a DT blog-dshr-org-2470 292 13 supply supply NN blog-dshr-org-2470 292 14 - - HYPH blog-dshr-org-2470 292 15 chain chain NN blog-dshr-org-2470 292 16 hacking hack VBG blog-dshr-org-2470 292 17 spree spree NN blog-dshr-org-2470 292 18 ties tie NNS blog-dshr-org-2470 292 19 various various JJ blog-dshr-org-2470 292 20 software software NN blog-dshr-org-2470 292 21 supply supply NN blog-dshr-org-2470 292 22 chain chain NN blog-dshr-org-2470 292 23 attacks attack NNS blog-dshr-org-2470 292 24 together together RB blog-dshr-org-2470 292 25 and and CC blog-dshr-org-2470 292 26 attributes attribute VBZ blog-dshr-org-2470 292 27 them -PRON- PRP blog-dshr-org-2470 292 28 : : : blog-dshr-org-2470 292 29 " " `` blog-dshr-org-2470 292 30 Over over IN blog-dshr-org-2470 292 31 the the DT blog-dshr-org-2470 292 32 past past JJ blog-dshr-org-2470 292 33 three three CD blog-dshr-org-2470 292 34 years year NNS blog-dshr-org-2470 292 35 , , , blog-dshr-org-2470 292 36 supply supply NN blog-dshr-org-2470 292 37 - - HYPH blog-dshr-org-2470 292 38 chain chain NN blog-dshr-org-2470 292 39 attacks attack NNS blog-dshr-org-2470 292 40 that that WDT blog-dshr-org-2470 292 41 exploited exploit VBD blog-dshr-org-2470 292 42 the the DT blog-dshr-org-2470 292 43 software software NN blog-dshr-org-2470 292 44 distribution distribution NN blog-dshr-org-2470 292 45 channels channel NNS blog-dshr-org-2470 292 46 of of IN blog-dshr-org-2470 292 47 at at IN blog-dshr-org-2470 292 48 least least JJS blog-dshr-org-2470 292 49 six six CD blog-dshr-org-2470 292 50 different different JJ blog-dshr-org-2470 292 51 companies company NNS blog-dshr-org-2470 292 52 have have VBP blog-dshr-org-2470 292 53 now now RB blog-dshr-org-2470 292 54 all all DT blog-dshr-org-2470 292 55 been be VBN blog-dshr-org-2470 292 56 tied tie VBN blog-dshr-org-2470 292 57 to to IN blog-dshr-org-2470 292 58 a a DT blog-dshr-org-2470 292 59 single single JJ blog-dshr-org-2470 292 60 group group NN blog-dshr-org-2470 292 61 of of IN blog-dshr-org-2470 292 62 likely likely JJ blog-dshr-org-2470 292 63 Chinese Chinese NNP blog-dshr-org-2470 292 64 - - HYPH blog-dshr-org-2470 292 65 speaking speak VBG blog-dshr-org-2470 292 66 hackers hacker NNS blog-dshr-org-2470 292 67 . . . blog-dshr-org-2470 293 1 The the DT blog-dshr-org-2470 293 2 group group NN blog-dshr-org-2470 293 3 is be VBZ blog-dshr-org-2470 293 4 known know VBN blog-dshr-org-2470 293 5 as as IN blog-dshr-org-2470 293 6 Barium Barium NNP blog-dshr-org-2470 293 7 , , , blog-dshr-org-2470 293 8 or or CC blog-dshr-org-2470 293 9 sometimes sometimes RB blog-dshr-org-2470 293 10 ShadowHammer ShadowHammer NNP blog-dshr-org-2470 293 11 , , , blog-dshr-org-2470 293 12 ShadowPad ShadowPad NNP blog-dshr-org-2470 293 13 , , , blog-dshr-org-2470 293 14 or or CC blog-dshr-org-2470 293 15 Wicked Wicked NNP blog-dshr-org-2470 293 16 Panda Panda NNP blog-dshr-org-2470 293 17 , , , blog-dshr-org-2470 293 18 depending depend VBG blog-dshr-org-2470 293 19 on on IN blog-dshr-org-2470 293 20 which which WDT blog-dshr-org-2470 293 21 security security NN blog-dshr-org-2470 293 22 firm firm NN blog-dshr-org-2470 293 23 you -PRON- PRP blog-dshr-org-2470 293 24 ask ask VBP blog-dshr-org-2470 293 25 . . . blog-dshr-org-2470 294 1 More More JJR blog-dshr-org-2470 294 2 than than IN blog-dshr-org-2470 294 3 perhaps perhaps RB blog-dshr-org-2470 294 4 any any DT blog-dshr-org-2470 294 5 other other JJ blog-dshr-org-2470 294 6 known know VBN blog-dshr-org-2470 294 7 hacker hacker NN blog-dshr-org-2470 294 8 team team NN blog-dshr-org-2470 294 9 , , , blog-dshr-org-2470 294 10 Barium Barium NNP blog-dshr-org-2470 294 11 appears appear VBZ blog-dshr-org-2470 294 12 to to TO blog-dshr-org-2470 294 13 use use VB blog-dshr-org-2470 294 14 supply supply NN blog-dshr-org-2470 294 15 - - HYPH blog-dshr-org-2470 294 16 chain chain NN blog-dshr-org-2470 294 17 attacks attack NNS blog-dshr-org-2470 294 18 as as IN blog-dshr-org-2470 294 19 its -PRON- PRP$ blog-dshr-org-2470 294 20 core core NN blog-dshr-org-2470 294 21 tool tool NN blog-dshr-org-2470 294 22 . . . blog-dshr-org-2470 295 1 Its -PRON- PRP$ blog-dshr-org-2470 295 2 attacks attack NNS blog-dshr-org-2470 295 3 all all DT blog-dshr-org-2470 295 4 follow follow VBP blog-dshr-org-2470 295 5 a a DT blog-dshr-org-2470 295 6 similar similar JJ blog-dshr-org-2470 295 7 pattern pattern NN blog-dshr-org-2470 295 8 : : : blog-dshr-org-2470 295 9 seed seed VB blog-dshr-org-2470 295 10 out out RP blog-dshr-org-2470 295 11 infections infection NNS blog-dshr-org-2470 295 12 to to IN blog-dshr-org-2470 295 13 a a DT blog-dshr-org-2470 295 14 massive massive JJ blog-dshr-org-2470 295 15 collection collection NN blog-dshr-org-2470 295 16 of of IN blog-dshr-org-2470 295 17 victims victim NNS blog-dshr-org-2470 295 18 , , , blog-dshr-org-2470 295 19 then then RB blog-dshr-org-2470 295 20 sort sort VB blog-dshr-org-2470 295 21 through through IN blog-dshr-org-2470 295 22 them -PRON- PRP blog-dshr-org-2470 295 23 to to TO blog-dshr-org-2470 295 24 find find VB blog-dshr-org-2470 295 25 espionage espionage NN blog-dshr-org-2470 295 26 targets target NNS blog-dshr-org-2470 295 27 . . . blog-dshr-org-2470 295 28 " " '' blog-dshr-org-2470 296 1 May May NNP blog-dshr-org-2470 296 2 4 4 CD blog-dshr-org-2470 296 3 , , , blog-dshr-org-2470 296 4 2019 2019 CD blog-dshr-org-2470 296 5 at at IN blog-dshr-org-2470 296 6 9:55 9:55 CD blog-dshr-org-2470 296 7 AM am NN blog-dshr-org-2470 296 8 David David NNP blog-dshr-org-2470 296 9 . . . blog-dshr-org-2470 297 1 said say VBD blog-dshr-org-2470 297 2 ... ... : blog-dshr-org-2470 298 1 Someone someone NN blog-dshr-org-2470 298 2 Is be VBZ blog-dshr-org-2470 298 3 Spamming spamme VBG blog-dshr-org-2470 298 4 and and CC blog-dshr-org-2470 298 5 Breaking break VBG blog-dshr-org-2470 298 6 a a DT blog-dshr-org-2470 298 7 Core Core NNP blog-dshr-org-2470 298 8 Component Component NNP blog-dshr-org-2470 298 9 of of IN blog-dshr-org-2470 298 10 PGP PGP NNP blog-dshr-org-2470 298 11 ’s ’s POS blog-dshr-org-2470 298 12 Ecosystem Ecosystem NNP blog-dshr-org-2470 298 13 by by IN blog-dshr-org-2470 298 14 Lorenzo Lorenzo NNP blog-dshr-org-2470 298 15 Franceschi Franceschi NNP blog-dshr-org-2470 298 16 - - HYPH blog-dshr-org-2470 298 17 Bicchierai Bicchierai NNP blog-dshr-org-2470 298 18 reports report VBZ blog-dshr-org-2470 298 19 on on IN blog-dshr-org-2470 298 20 an an DT blog-dshr-org-2470 298 21 attack attack NN blog-dshr-org-2470 298 22 on on IN blog-dshr-org-2470 298 23 two two CD blog-dshr-org-2470 298 24 of of IN blog-dshr-org-2470 298 25 the the DT blog-dshr-org-2470 298 26 core core NN blog-dshr-org-2470 298 27 PGP PGP NNP blog-dshr-org-2470 298 28 developers developer NNS blog-dshr-org-2470 298 29 , , , blog-dshr-org-2470 298 30 Robert Robert NNP blog-dshr-org-2470 298 31 J. J. NNP blog-dshr-org-2470 298 32 Hansen Hansen NNP blog-dshr-org-2470 298 33 and and CC blog-dshr-org-2470 298 34 Daniel Daniel NNP blog-dshr-org-2470 298 35 Kahn Kahn NNP blog-dshr-org-2470 298 36 Gillmor Gillmor NNP blog-dshr-org-2470 298 37 : : : blog-dshr-org-2470 298 38 " " `` blog-dshr-org-2470 298 39 Last last JJ blog-dshr-org-2470 298 40 week week NN blog-dshr-org-2470 298 41 , , , blog-dshr-org-2470 298 42 contributors contributor NNS blog-dshr-org-2470 298 43 to to IN blog-dshr-org-2470 298 44 the the DT blog-dshr-org-2470 298 45 PGP PGP NNP blog-dshr-org-2470 298 46 protocol protocol NN blog-dshr-org-2470 298 47 GnuPG GnuPG NNP blog-dshr-org-2470 298 48 noticed notice VBD blog-dshr-org-2470 298 49 that that IN blog-dshr-org-2470 298 50 someone someone NN blog-dshr-org-2470 298 51 was be VBD blog-dshr-org-2470 298 52 “ " `` blog-dshr-org-2470 298 53 poisoning poison VBG blog-dshr-org-2470 298 54 ” " '' blog-dshr-org-2470 298 55 or or CC blog-dshr-org-2470 298 56 “ " `` blog-dshr-org-2470 298 57 flooding flood VBG blog-dshr-org-2470 298 58 ” " '' blog-dshr-org-2470 298 59 their -PRON- PRP$ blog-dshr-org-2470 298 60 certificates certificate NNS blog-dshr-org-2470 298 61 . . . blog-dshr-org-2470 299 1 In in IN blog-dshr-org-2470 299 2 this this DT blog-dshr-org-2470 299 3 case case NN blog-dshr-org-2470 299 4 , , , blog-dshr-org-2470 299 5 poisoning poisoning NN blog-dshr-org-2470 299 6 refers refer VBZ blog-dshr-org-2470 299 7 to to IN blog-dshr-org-2470 299 8 an an DT blog-dshr-org-2470 299 9 attack attack NN blog-dshr-org-2470 299 10 where where WRB blog-dshr-org-2470 299 11 someone someone NN blog-dshr-org-2470 299 12 spams spam VBZ blog-dshr-org-2470 299 13 a a DT blog-dshr-org-2470 299 14 certificate certificate NN blog-dshr-org-2470 299 15 with with IN blog-dshr-org-2470 299 16 a a DT blog-dshr-org-2470 299 17 large large JJ blog-dshr-org-2470 299 18 number number NN blog-dshr-org-2470 299 19 of of IN blog-dshr-org-2470 299 20 signatures signature NNS blog-dshr-org-2470 299 21 or or CC blog-dshr-org-2470 299 22 certifications certification NNS blog-dshr-org-2470 299 23 . . . blog-dshr-org-2470 300 1 This this DT blog-dshr-org-2470 300 2 makes make VBZ blog-dshr-org-2470 300 3 it -PRON- PRP blog-dshr-org-2470 300 4 impossible impossible JJ blog-dshr-org-2470 300 5 for for IN blog-dshr-org-2470 300 6 the the DT blog-dshr-org-2470 300 7 the the DT blog-dshr-org-2470 300 8 PGP PGP NNP blog-dshr-org-2470 300 9 software software NN blog-dshr-org-2470 300 10 that that WDT blog-dshr-org-2470 300 11 people people NNS blog-dshr-org-2470 300 12 use use VBP blog-dshr-org-2470 300 13 to to TO blog-dshr-org-2470 300 14 verify verify VB blog-dshr-org-2470 300 15 its -PRON- PRP$ blog-dshr-org-2470 300 16 authenticity authenticity NN blog-dshr-org-2470 300 17 , , , blog-dshr-org-2470 300 18 which which WDT blog-dshr-org-2470 300 19 can can MD blog-dshr-org-2470 300 20 make make VB blog-dshr-org-2470 300 21 the the DT blog-dshr-org-2470 300 22 software software NN blog-dshr-org-2470 300 23 unusable unusable JJ blog-dshr-org-2470 300 24 or or CC blog-dshr-org-2470 300 25 break break VBP blog-dshr-org-2470 300 26 . . . blog-dshr-org-2470 301 1 In in IN blog-dshr-org-2470 301 2 practice practice NN blog-dshr-org-2470 301 3 , , , blog-dshr-org-2470 301 4 according accord VBG blog-dshr-org-2470 301 5 to to IN blog-dshr-org-2470 301 6 one one CD blog-dshr-org-2470 301 7 of of IN blog-dshr-org-2470 301 8 the the DT blog-dshr-org-2470 301 9 GnuPG GnuPG NNP blog-dshr-org-2470 301 10 developers developer NNS blog-dshr-org-2470 301 11 targeted target VBN blog-dshr-org-2470 301 12 by by IN blog-dshr-org-2470 301 13 this this DT blog-dshr-org-2470 301 14 attack attack NN blog-dshr-org-2470 301 15 , , , blog-dshr-org-2470 301 16 the the DT blog-dshr-org-2470 301 17 hackers hacker NNS blog-dshr-org-2470 301 18 could could MD blog-dshr-org-2470 301 19 make make VB blog-dshr-org-2470 301 20 it -PRON- PRP blog-dshr-org-2470 301 21 impossible impossible JJ blog-dshr-org-2470 301 22 for for IN blog-dshr-org-2470 301 23 people people NNS blog-dshr-org-2470 301 24 using use VBG blog-dshr-org-2470 301 25 Linux Linux NNP blog-dshr-org-2470 301 26 to to TO blog-dshr-org-2470 301 27 download download VB blog-dshr-org-2470 301 28 updates update NNS blog-dshr-org-2470 301 29 , , , blog-dshr-org-2470 301 30 which which WDT blog-dshr-org-2470 301 31 are be VBP blog-dshr-org-2470 301 32 verified verify VBN blog-dshr-org-2470 301 33 via via IN blog-dshr-org-2470 301 34 PGP PGP NNP blog-dshr-org-2470 301 35 . . . blog-dshr-org-2470 301 36 " " '' blog-dshr-org-2470 302 1 The the DT blog-dshr-org-2470 302 2 problem problem NN blog-dshr-org-2470 302 3 lies lie VBZ blog-dshr-org-2470 302 4 in in IN blog-dshr-org-2470 302 5 the the DT blog-dshr-org-2470 302 6 SKS SKS NNP blog-dshr-org-2470 302 7 keyserver keyserver NN blog-dshr-org-2470 302 8 : : : blog-dshr-org-2470 302 9 " " `` blog-dshr-org-2470 302 10 the the DT blog-dshr-org-2470 302 11 SKS SKS NNP blog-dshr-org-2470 302 12 software software NN blog-dshr-org-2470 302 13 was be VBD blog-dshr-org-2470 302 14 written write VBN blog-dshr-org-2470 302 15 in in IN blog-dshr-org-2470 302 16 an an DT blog-dshr-org-2470 302 17 obscure obscure JJ blog-dshr-org-2470 302 18 language language NN blog-dshr-org-2470 302 19 by by IN blog-dshr-org-2470 302 20 a a DT blog-dshr-org-2470 302 21 PhD phd NN blog-dshr-org-2470 302 22 student student NN blog-dshr-org-2470 302 23 for for IN blog-dshr-org-2470 302 24 his -PRON- PRP$ blog-dshr-org-2470 302 25 thesis thesis NN blog-dshr-org-2470 302 26 . . . blog-dshr-org-2470 303 1 And and CC blog-dshr-org-2470 303 2 because because IN blog-dshr-org-2470 303 3 of of IN blog-dshr-org-2470 303 4 that that DT blog-dshr-org-2470 303 5 , , , blog-dshr-org-2470 303 6 according accord VBG blog-dshr-org-2470 303 7 to to IN blog-dshr-org-2470 303 8 Hansen Hansen NNP blog-dshr-org-2470 303 9 , , , blog-dshr-org-2470 303 10 “ " `` blog-dshr-org-2470 303 11 there there EX blog-dshr-org-2470 303 12 is be VBZ blog-dshr-org-2470 303 13 literally literally RB blog-dshr-org-2470 303 14 no no DT blog-dshr-org-2470 303 15 one one NN blog-dshr-org-2470 303 16 in in IN blog-dshr-org-2470 303 17 the the DT blog-dshr-org-2470 303 18 keyserver keyserver NNP blog-dshr-org-2470 303 19 community community NN blog-dshr-org-2470 303 20 who who WP blog-dshr-org-2470 303 21 feels feel VBZ blog-dshr-org-2470 303 22 qualified qualified JJ blog-dshr-org-2470 303 23 to to TO blog-dshr-org-2470 303 24 do do VB blog-dshr-org-2470 303 25 a a DT blog-dshr-org-2470 303 26 serious serious JJ blog-dshr-org-2470 303 27 overhaul overhaul NN blog-dshr-org-2470 303 28 on on IN blog-dshr-org-2470 303 29 the the DT blog-dshr-org-2470 303 30 codebase codebase NN blog-dshr-org-2470 303 31 . . . blog-dshr-org-2470 303 32 ” " '' blog-dshr-org-2470 303 33 In in IN blog-dshr-org-2470 303 34 other other JJ blog-dshr-org-2470 303 35 words word NNS blog-dshr-org-2470 303 36 , , , blog-dshr-org-2470 303 37 these these DT blog-dshr-org-2470 303 38 attacks attack NNS blog-dshr-org-2470 303 39 are be VBP blog-dshr-org-2470 303 40 here here RB blog-dshr-org-2470 303 41 to to TO blog-dshr-org-2470 303 42 stay stay VB blog-dshr-org-2470 303 43 . . . blog-dshr-org-2470 303 44 " " '' blog-dshr-org-2470 304 1 July July NNP blog-dshr-org-2470 304 2 3 3 CD blog-dshr-org-2470 304 3 , , , blog-dshr-org-2470 304 4 2019 2019 CD blog-dshr-org-2470 304 5 at at IN blog-dshr-org-2470 304 6 4:40 4:40 CD blog-dshr-org-2470 304 7 PM PM NNP blog-dshr-org-2470 304 8 David David NNP blog-dshr-org-2470 304 9 . . . blog-dshr-org-2470 305 1 said say VBD blog-dshr-org-2470 305 2 ... ... : blog-dshr-org-2470 305 3 Dan Dan NNP blog-dshr-org-2470 305 4 Goodin Goodin NNP blog-dshr-org-2470 305 5 's 's POS blog-dshr-org-2470 305 6 The the DT blog-dshr-org-2470 305 7 year year NN blog-dshr-org-2470 305 8 - - HYPH blog-dshr-org-2470 305 9 long long JJ blog-dshr-org-2470 305 10 rash rash NN blog-dshr-org-2470 305 11 of of IN blog-dshr-org-2470 305 12 supply supply NN blog-dshr-org-2470 305 13 chain chain NN blog-dshr-org-2470 305 14 attacks attack NNS blog-dshr-org-2470 305 15 against against IN blog-dshr-org-2470 305 16 open open JJ blog-dshr-org-2470 305 17 source source NN blog-dshr-org-2470 305 18 is be VBZ blog-dshr-org-2470 305 19 getting get VBG blog-dshr-org-2470 305 20 worse bad JJR blog-dshr-org-2470 305 21 is be VBZ blog-dshr-org-2470 305 22 a a DT blog-dshr-org-2470 305 23 useful useful JJ blog-dshr-org-2470 305 24 overview overview NN blog-dshr-org-2470 305 25 of of IN blog-dshr-org-2470 305 26 the the DT blog-dshr-org-2470 305 27 recent recent JJ blog-dshr-org-2470 305 28 incidents incident NNS blog-dshr-org-2470 305 29 pointing point VBG blog-dshr-org-2470 305 30 to to IN blog-dshr-org-2470 305 31 the the DT blog-dshr-org-2470 305 32 need need NN blog-dshr-org-2470 305 33 for for IN blog-dshr-org-2470 305 34 verifiable verifiable JJ blog-dshr-org-2470 305 35 logs log NNS blog-dshr-org-2470 305 36 and and CC blog-dshr-org-2470 305 37 reproducible reproducible NN blog-dshr-org-2470 305 38 builds build VBZ blog-dshr-org-2470 305 39 . . . blog-dshr-org-2470 306 1 And and CC blog-dshr-org-2470 306 2 , , , blog-dshr-org-2470 306 3 of of IN blog-dshr-org-2470 306 4 course course NN blog-dshr-org-2470 306 5 , , , blog-dshr-org-2470 306 6 for for IN blog-dshr-org-2470 306 7 requiring require VBG blog-dshr-org-2470 306 8 developers developer NNS blog-dshr-org-2470 306 9 to to TO blog-dshr-org-2470 306 10 use use VB blog-dshr-org-2470 306 11 multi multi JJ blog-dshr-org-2470 306 12 -- -- : blog-dshr-org-2470 306 13 factor factor NN blog-dshr-org-2470 306 14 authentication authentication NN blog-dshr-org-2470 306 15 . . . blog-dshr-org-2470 307 1 August August NNP blog-dshr-org-2470 307 2 21 21 CD blog-dshr-org-2470 307 3 , , , blog-dshr-org-2470 307 4 2019 2019 CD blog-dshr-org-2470 307 5 at at IN blog-dshr-org-2470 307 6 4:43 4:43 CD blog-dshr-org-2470 307 7 PM pm NN blog-dshr-org-2470 307 8 David David NNP blog-dshr-org-2470 307 9 . . . blog-dshr-org-2470 308 1 said say VBD blog-dshr-org-2470 308 2 ... ... : blog-dshr-org-2470 308 3 Catalin Catalin NNP blog-dshr-org-2470 308 4 Cimpanu Cimpanu NNP blog-dshr-org-2470 308 5 's 's POS blog-dshr-org-2470 308 6 Hacking Hacking NNP blog-dshr-org-2470 308 7 20 20 CD blog-dshr-org-2470 308 8 high high JJ blog-dshr-org-2470 308 9 - - HYPH blog-dshr-org-2470 308 10 profile profile NN blog-dshr-org-2470 308 11 dev dev NN blog-dshr-org-2470 308 12 accounts account NNS blog-dshr-org-2470 308 13 could could MD blog-dshr-org-2470 308 14 compromise compromise VB blog-dshr-org-2470 308 15 half half NN blog-dshr-org-2470 308 16 of of IN blog-dshr-org-2470 308 17 the the DT blog-dshr-org-2470 308 18 npm npm NNP blog-dshr-org-2470 308 19 ecosystem ecosystem NNP blog-dshr-org-2470 308 20 is be VBZ blog-dshr-org-2470 308 21 based base VBN blog-dshr-org-2470 308 22 on on IN blog-dshr-org-2470 308 23 Small Small NNP blog-dshr-org-2470 308 24 World World NNP blog-dshr-org-2470 308 25 with with IN blog-dshr-org-2470 308 26 High high JJ blog-dshr-org-2470 308 27 Risks risk NNS blog-dshr-org-2470 308 28 : : : blog-dshr-org-2470 308 29 A a DT blog-dshr-org-2470 308 30 Study Study NNP blog-dshr-org-2470 308 31 of of IN blog-dshr-org-2470 308 32 Security Security NNP blog-dshr-org-2470 308 33 Threats Threats NNPS blog-dshr-org-2470 308 34 in in IN blog-dshr-org-2470 308 35 the the DT blog-dshr-org-2470 308 36 npm npm NN blog-dshr-org-2470 308 37 Ecosystem Ecosystem NNP blog-dshr-org-2470 308 38 by by IN blog-dshr-org-2470 308 39 Marcus Marcus NNP blog-dshr-org-2470 308 40 Zimmerman Zimmerman NNP blog-dshr-org-2470 308 41 et et NNP blog-dshr-org-2470 308 42 al al XX blog-dshr-org-2470 308 43 : : : blog-dshr-org-2470 308 44 " " `` blog-dshr-org-2470 308 45 Their -PRON- PRP$ blog-dshr-org-2470 308 46 goal goal NN blog-dshr-org-2470 308 47 was be VBD blog-dshr-org-2470 308 48 to to TO blog-dshr-org-2470 308 49 get get VB blog-dshr-org-2470 308 50 an an DT blog-dshr-org-2470 308 51 idea idea NN blog-dshr-org-2470 308 52 of of IN blog-dshr-org-2470 308 53 how how WRB blog-dshr-org-2470 308 54 hacking hack VBG blog-dshr-org-2470 308 55 one one CD blog-dshr-org-2470 308 56 or or CC blog-dshr-org-2470 308 57 more more JJR blog-dshr-org-2470 308 58 npm npm FW blog-dshr-org-2470 308 59 maintainer maintainer NN blog-dshr-org-2470 308 60 accounts account NNS blog-dshr-org-2470 308 61 , , , blog-dshr-org-2470 308 62 or or CC blog-dshr-org-2470 308 63 how how WRB blog-dshr-org-2470 308 64 vulnerabilities vulnerability NNS blog-dshr-org-2470 308 65 in in IN blog-dshr-org-2470 308 66 one one CD blog-dshr-org-2470 308 67 or or CC blog-dshr-org-2470 308 68 more more JJR blog-dshr-org-2470 308 69 packages package NNS blog-dshr-org-2470 308 70 , , , blog-dshr-org-2470 308 71 reverberated reverberate VBN blog-dshr-org-2470 308 72 across across IN blog-dshr-org-2470 308 73 the the DT blog-dshr-org-2470 308 74 npm npm NNP blog-dshr-org-2470 308 75 ecosystem ecosystem NN blog-dshr-org-2470 308 76 ; ; : blog-dshr-org-2470 308 77 along along IN blog-dshr-org-2470 308 78 with with IN blog-dshr-org-2470 308 79 the the DT blog-dshr-org-2470 308 80 critical critical JJ blog-dshr-org-2470 308 81 mass mass NN blog-dshr-org-2470 308 82 needed need VBN blog-dshr-org-2470 308 83 to to TO blog-dshr-org-2470 308 84 cause cause VB blog-dshr-org-2470 308 85 security security NN blog-dshr-org-2470 308 86 incidents incident NNS blog-dshr-org-2470 308 87 inside inside IN blog-dshr-org-2470 308 88 tens ten NNS blog-dshr-org-2470 308 89 of of IN blog-dshr-org-2470 308 90 thousands thousand NNS blog-dshr-org-2470 308 91 of of IN blog-dshr-org-2470 308 92 npm npm NN blog-dshr-org-2470 308 93 projects project NNS blog-dshr-org-2470 308 94 at at IN blog-dshr-org-2470 308 95 a a DT blog-dshr-org-2470 308 96 time time NN blog-dshr-org-2470 308 97 . . . blog-dshr-org-2470 309 1 ... ... NFP blog-dshr-org-2470 309 2 the the DT blog-dshr-org-2470 309 3 normal normal JJ blog-dshr-org-2470 309 4 npm npm NN blog-dshr-org-2470 309 5 JavaScript JavaScript NNP blog-dshr-org-2470 309 6 package package NN blog-dshr-org-2470 309 7 has have VBZ blog-dshr-org-2470 309 8 an an DT blog-dshr-org-2470 309 9 abnormally abnormally RB blog-dshr-org-2470 309 10 large large JJ blog-dshr-org-2470 309 11 number number NN blog-dshr-org-2470 309 12 of of IN blog-dshr-org-2470 309 13 dependencies dependency NNS blog-dshr-org-2470 309 14 -- -- : blog-dshr-org-2470 309 15 with with IN blog-dshr-org-2470 309 16 a a DT blog-dshr-org-2470 309 17 package package NN blog-dshr-org-2470 309 18 loading load VBG blog-dshr-org-2470 309 19 79 79 CD blog-dshr-org-2470 309 20 third third JJ blog-dshr-org-2470 309 21 - - HYPH blog-dshr-org-2470 309 22 party party NN blog-dshr-org-2470 309 23 packages package NNS blog-dshr-org-2470 309 24 from from IN blog-dshr-org-2470 309 25 39 39 CD blog-dshr-org-2470 309 26 different different JJ blog-dshr-org-2470 309 27 maintainers maintainer NNS blog-dshr-org-2470 309 28 , , , blog-dshr-org-2470 309 29 on on IN blog-dshr-org-2470 309 30 average average JJ blog-dshr-org-2470 309 31 . . . blog-dshr-org-2470 310 1 This this DT blog-dshr-org-2470 310 2 number number NN blog-dshr-org-2470 310 3 is be VBZ blog-dshr-org-2470 310 4 lower low JJR blog-dshr-org-2470 310 5 for for IN blog-dshr-org-2470 310 6 popular popular JJ blog-dshr-org-2470 310 7 packages package NNS blog-dshr-org-2470 310 8 , , , blog-dshr-org-2470 310 9 which which WDT blog-dshr-org-2470 310 10 only only RB blog-dshr-org-2470 310 11 rely rely VBP blog-dshr-org-2470 310 12 on on IN blog-dshr-org-2470 310 13 code code NN blog-dshr-org-2470 310 14 from from IN blog-dshr-org-2470 310 15 20 20 CD blog-dshr-org-2470 310 16 other other JJ blog-dshr-org-2470 310 17 maintainers maintainer NNS blog-dshr-org-2470 310 18 , , , blog-dshr-org-2470 310 19 on on IN blog-dshr-org-2470 310 20 average average JJ blog-dshr-org-2470 310 21 , , , blog-dshr-org-2470 310 22 but but CC blog-dshr-org-2470 310 23 the the DT blog-dshr-org-2470 310 24 research research NN blog-dshr-org-2470 310 25 team team NN blog-dshr-org-2470 310 26 found find VBD blog-dshr-org-2470 310 27 that that IN blog-dshr-org-2470 310 28 some some DT blog-dshr-org-2470 310 29 popular popular JJ blog-dshr-org-2470 310 30 npm npm NN blog-dshr-org-2470 310 31 packages package NNS blog-dshr-org-2470 310 32 ( ( -LRB- blog-dshr-org-2470 310 33 600 600 CD blog-dshr-org-2470 310 34 ) ) -RRB- blog-dshr-org-2470 310 35 relied rely VBD blog-dshr-org-2470 310 36 on on IN blog-dshr-org-2470 310 37 code code NN blog-dshr-org-2470 310 38 written write VBN blog-dshr-org-2470 310 39 by by IN blog-dshr-org-2470 310 40 more more JJR blog-dshr-org-2470 310 41 than than IN blog-dshr-org-2470 310 42 100 100 CD blog-dshr-org-2470 310 43 maintainers maintainer NNS blog-dshr-org-2470 310 44 . . . blog-dshr-org-2470 311 1 ... ... NFP blog-dshr-org-2470 311 2 " " `` blog-dshr-org-2470 311 3 391 391 CD blog-dshr-org-2470 311 4 highly highly RB blog-dshr-org-2470 311 5 influential influential JJ blog-dshr-org-2470 311 6 maintainers maintainer NNS blog-dshr-org-2470 311 7 affect affect VBP blog-dshr-org-2470 311 8 more more JJR blog-dshr-org-2470 311 9 than than IN blog-dshr-org-2470 311 10 10,000 10,000 CD blog-dshr-org-2470 311 11 packages package NNS blog-dshr-org-2470 311 12 , , , blog-dshr-org-2470 311 13 making make VBG blog-dshr-org-2470 311 14 them -PRON- PRP blog-dshr-org-2470 311 15 prime prime JJ blog-dshr-org-2470 311 16 targets target NNS blog-dshr-org-2470 311 17 for for IN blog-dshr-org-2470 311 18 attacks attack NNS blog-dshr-org-2470 311 19 , , , blog-dshr-org-2470 311 20 " " '' blog-dshr-org-2470 311 21 the the DT blog-dshr-org-2470 311 22 research research NN blog-dshr-org-2470 311 23 team team NN blog-dshr-org-2470 311 24 said say VBD blog-dshr-org-2470 311 25 . . . blog-dshr-org-2470 312 1 " " `` blog-dshr-org-2470 312 2 If if IN blog-dshr-org-2470 312 3 an an DT blog-dshr-org-2470 312 4 attacker attacker NN blog-dshr-org-2470 312 5 manages manage VBZ blog-dshr-org-2470 312 6 to to TO blog-dshr-org-2470 312 7 compromise compromise VB blog-dshr-org-2470 312 8 the the DT blog-dshr-org-2470 312 9 account account NN blog-dshr-org-2470 312 10 of of IN blog-dshr-org-2470 312 11 any any DT blog-dshr-org-2470 312 12 of of IN blog-dshr-org-2470 312 13 the the DT blog-dshr-org-2470 312 14 391 391 CD blog-dshr-org-2470 312 15 most most RBS blog-dshr-org-2470 312 16 influential influential JJ blog-dshr-org-2470 312 17 maintainers maintainer NNS blog-dshr-org-2470 312 18 , , , blog-dshr-org-2470 312 19 the the DT blog-dshr-org-2470 312 20 community community NN blog-dshr-org-2470 312 21 will will MD blog-dshr-org-2470 312 22 experience experience VB blog-dshr-org-2470 312 23 a a DT blog-dshr-org-2470 312 24 serious serious JJ blog-dshr-org-2470 312 25 security security NN blog-dshr-org-2470 312 26 incident incident NN blog-dshr-org-2470 312 27 . . . blog-dshr-org-2470 312 28 " " '' blog-dshr-org-2470 313 1 Furthermore furthermore RB blog-dshr-org-2470 313 2 , , , blog-dshr-org-2470 313 3 in in IN blog-dshr-org-2470 313 4 a a DT blog-dshr-org-2470 313 5 worst bad JJS blog-dshr-org-2470 313 6 - - HYPH blog-dshr-org-2470 313 7 case case NN blog-dshr-org-2470 313 8 scenario scenario NN blog-dshr-org-2470 313 9 where where WRB blog-dshr-org-2470 313 10 multiple multiple JJ blog-dshr-org-2470 313 11 maintainers maintainer NNS blog-dshr-org-2470 313 12 collude collude VBP blog-dshr-org-2470 313 13 , , , blog-dshr-org-2470 313 14 or or CC blog-dshr-org-2470 313 15 a a DT blog-dshr-org-2470 313 16 hacker hacker NN blog-dshr-org-2470 313 17 gains gain VBZ blog-dshr-org-2470 313 18 access access NN blog-dshr-org-2470 313 19 to to IN blog-dshr-org-2470 313 20 a a DT blog-dshr-org-2470 313 21 large large JJ blog-dshr-org-2470 313 22 number number NN blog-dshr-org-2470 313 23 of of IN blog-dshr-org-2470 313 24 accounts account NNS blog-dshr-org-2470 313 25 , , , blog-dshr-org-2470 313 26 the the DT blog-dshr-org-2470 313 27 Darmstadt Darmstadt NNP blog-dshr-org-2470 313 28 team team NN blog-dshr-org-2470 313 29 said say VBD blog-dshr-org-2470 313 30 that that IN blog-dshr-org-2470 313 31 it -PRON- PRP blog-dshr-org-2470 313 32 only only RB blog-dshr-org-2470 313 33 takes take VBZ blog-dshr-org-2470 313 34 access access NN blog-dshr-org-2470 313 35 to to IN blog-dshr-org-2470 313 36 20 20 CD blog-dshr-org-2470 313 37 popular popular JJ blog-dshr-org-2470 313 38 npm npm NN blog-dshr-org-2470 313 39 maintainer maintainer NN blog-dshr-org-2470 313 40 accounts account VBZ blog-dshr-org-2470 313 41 to to TO blog-dshr-org-2470 313 42 deploy deploy VB blog-dshr-org-2470 313 43 malicious malicious JJ blog-dshr-org-2470 313 44 code code NN blog-dshr-org-2470 313 45 impacting impact VBG blog-dshr-org-2470 313 46 more more JJR blog-dshr-org-2470 313 47 than than IN blog-dshr-org-2470 313 48 half half NN blog-dshr-org-2470 313 49 of of IN blog-dshr-org-2470 313 50 the the DT blog-dshr-org-2470 313 51 npm npm NNP blog-dshr-org-2470 313 52 ecosystem ecosystem NNP blog-dshr-org-2470 313 53 . . . blog-dshr-org-2470 313 54 " " '' blog-dshr-org-2470 314 1 October October NNP blog-dshr-org-2470 314 2 18 18 CD blog-dshr-org-2470 314 3 , , , blog-dshr-org-2470 314 4 2019 2019 CD blog-dshr-org-2470 314 5 at at IN blog-dshr-org-2470 314 6 11:55 11:55 CD blog-dshr-org-2470 314 7 AM am NN blog-dshr-org-2470 314 8 David David NNP blog-dshr-org-2470 314 9 . . . blog-dshr-org-2470 315 1 said say VBD blog-dshr-org-2470 315 2 ... ... : blog-dshr-org-2470 315 3 Five five CD blog-dshr-org-2470 315 4 years year NNS blog-dshr-org-2470 315 5 after after IN blog-dshr-org-2470 315 6 the the DT blog-dshr-org-2470 315 7 Equation Equation NNP blog-dshr-org-2470 315 8 Group Group NNP blog-dshr-org-2470 315 9 HDD HDD NNP blog-dshr-org-2470 315 10 hacks hack NNS blog-dshr-org-2470 315 11 , , , blog-dshr-org-2470 315 12 firmware firmware JJ blog-dshr-org-2470 315 13 security security NN blog-dshr-org-2470 315 14 still still RB blog-dshr-org-2470 315 15 sucks suck VBZ blog-dshr-org-2470 315 16 by by IN blog-dshr-org-2470 315 17 Catalin Catalin NNP blog-dshr-org-2470 315 18 Cimpanu Cimpanu NNP blog-dshr-org-2470 315 19 illustrates illustrate VBZ blog-dshr-org-2470 315 20 how how WRB blog-dshr-org-2470 315 21 far far RB blog-dshr-org-2470 315 22 disk disk NN blog-dshr-org-2470 315 23 drive drive NN blog-dshr-org-2470 315 24 firmware firmware NN blog-dshr-org-2470 315 25 security security NN blog-dshr-org-2470 315 26 is be VBZ blog-dshr-org-2470 315 27 ahead ahead RB blog-dshr-org-2470 315 28 of of IN blog-dshr-org-2470 315 29 the the DT blog-dshr-org-2470 315 30 rest rest NN blog-dshr-org-2470 315 31 of of IN blog-dshr-org-2470 315 32 the the DT blog-dshr-org-2470 315 33 device device NN blog-dshr-org-2470 315 34 firmware firmware NN blog-dshr-org-2470 315 35 world world NN blog-dshr-org-2470 315 36 : : : blog-dshr-org-2470 315 37 " " `` blog-dshr-org-2470 315 38 In in IN blog-dshr-org-2470 315 39 2015 2015 CD blog-dshr-org-2470 315 40 , , , blog-dshr-org-2470 315 41 security security NN blog-dshr-org-2470 315 42 researchers researcher NNS blog-dshr-org-2470 315 43 from from IN blog-dshr-org-2470 315 44 Kaspersky Kaspersky NNP blog-dshr-org-2470 315 45 discovered discover VBD blog-dshr-org-2470 315 46 a a DT blog-dshr-org-2470 315 47 novel novel JJ blog-dshr-org-2470 315 48 type type NN blog-dshr-org-2470 315 49 of of IN blog-dshr-org-2470 315 50 malware malware NN blog-dshr-org-2470 315 51 that that WDT blog-dshr-org-2470 315 52 nobody nobody NN blog-dshr-org-2470 315 53 else else RB blog-dshr-org-2470 315 54 had have VBD blog-dshr-org-2470 315 55 seen see VBN blog-dshr-org-2470 315 56 before before RB blog-dshr-org-2470 315 57 until until IN blog-dshr-org-2470 315 58 then then RB blog-dshr-org-2470 315 59 . . . blog-dshr-org-2470 316 1 The the DT blog-dshr-org-2470 316 2 malware malware NN blog-dshr-org-2470 316 3 , , , blog-dshr-org-2470 316 4 known know VBN blog-dshr-org-2470 316 5 as as IN blog-dshr-org-2470 316 6 NLS_933.dll NLS_933.dll NNP blog-dshr-org-2470 316 7 , , , blog-dshr-org-2470 316 8 had have VBD blog-dshr-org-2470 316 9 the the DT blog-dshr-org-2470 316 10 ability ability NN blog-dshr-org-2470 316 11 to to TO blog-dshr-org-2470 316 12 rewrite rewrite VB blog-dshr-org-2470 316 13 HDD HDD NNP blog-dshr-org-2470 316 14 firmware firmware NN blog-dshr-org-2470 316 15 for for IN blog-dshr-org-2470 316 16 a a DT blog-dshr-org-2470 316 17 dozen dozen NN blog-dshr-org-2470 316 18 of of IN blog-dshr-org-2470 316 19 HDD HDD NNP blog-dshr-org-2470 316 20 brands brand NNS blog-dshr-org-2470 316 21 to to TO blog-dshr-org-2470 316 22 plant plant VB blog-dshr-org-2470 316 23 persistent persistent JJ blog-dshr-org-2470 316 24 backdoors backdoor NNS blog-dshr-org-2470 316 25 . . . blog-dshr-org-2470 317 1 Kaspersky Kaspersky NNP blog-dshr-org-2470 317 2 said say VBD blog-dshr-org-2470 317 3 the the DT blog-dshr-org-2470 317 4 malware malware NN blog-dshr-org-2470 317 5 was be VBD blog-dshr-org-2470 317 6 used use VBN blog-dshr-org-2470 317 7 in in IN blog-dshr-org-2470 317 8 attacks attack NNS blog-dshr-org-2470 317 9 against against IN blog-dshr-org-2470 317 10 systems system NNS blog-dshr-org-2470 317 11 all all RB blog-dshr-org-2470 317 12 over over IN blog-dshr-org-2470 317 13 the the DT blog-dshr-org-2470 317 14 world world NN blog-dshr-org-2470 317 15 . . . blog-dshr-org-2470 318 1 Kaspersky kaspersky JJ blog-dshr-org-2470 318 2 researchers researcher NNS blog-dshr-org-2470 318 3 claimed claim VBD blog-dshr-org-2470 318 4 the the DT blog-dshr-org-2470 318 5 malware malware NN blog-dshr-org-2470 318 6 was be VBD blog-dshr-org-2470 318 7 developed develop VBN blog-dshr-org-2470 318 8 by by IN blog-dshr-org-2470 318 9 a a DT blog-dshr-org-2470 318 10 hacker hacker NN blog-dshr-org-2470 318 11 group group NN blog-dshr-org-2470 318 12 known know VBN blog-dshr-org-2470 318 13 as as IN blog-dshr-org-2470 318 14 the the DT blog-dshr-org-2470 318 15 Equation Equation NNP blog-dshr-org-2470 318 16 Group Group NNP blog-dshr-org-2470 318 17 , , , blog-dshr-org-2470 318 18 a a DT blog-dshr-org-2470 318 19 codename codename NN blog-dshr-org-2470 318 20 that that WDT blog-dshr-org-2470 318 21 was be VBD blog-dshr-org-2470 318 22 later later RB blog-dshr-org-2470 318 23 associated associate VBN blog-dshr-org-2470 318 24 with with IN blog-dshr-org-2470 318 25 the the DT blog-dshr-org-2470 318 26 US US NNP blog-dshr-org-2470 318 27 National National NNP blog-dshr-org-2470 318 28 Security Security NNP blog-dshr-org-2470 318 29 Agency Agency NNP blog-dshr-org-2470 318 30 ( ( -LRB- blog-dshr-org-2470 318 31 NSA NSA NNP blog-dshr-org-2470 318 32 ) ) -RRB- blog-dshr-org-2470 318 33 . . . blog-dshr-org-2470 319 1 Knowing know VBG blog-dshr-org-2470 319 2 that that IN blog-dshr-org-2470 319 3 the the DT blog-dshr-org-2470 319 4 NSA NSA NNP blog-dshr-org-2470 319 5 was be VBD blog-dshr-org-2470 319 6 spying spy VBG blog-dshr-org-2470 319 7 on on IN blog-dshr-org-2470 319 8 their -PRON- PRP$ blog-dshr-org-2470 319 9 customers customer NNS blog-dshr-org-2470 319 10 led lead VBD blog-dshr-org-2470 319 11 many many JJ blog-dshr-org-2470 319 12 HDD HDD NNP blog-dshr-org-2470 319 13 and and CC blog-dshr-org-2470 319 14 SSD SSD NNP blog-dshr-org-2470 319 15 vendors vendor NNS blog-dshr-org-2470 319 16 to to TO blog-dshr-org-2470 319 17 improve improve VB blog-dshr-org-2470 319 18 the the DT blog-dshr-org-2470 319 19 security security NN blog-dshr-org-2470 319 20 of of IN blog-dshr-org-2470 319 21 their -PRON- PRP$ blog-dshr-org-2470 319 22 firmware firmware NN blog-dshr-org-2470 319 23 , , , blog-dshr-org-2470 319 24 Eclypsium Eclypsium NNP blog-dshr-org-2470 319 25 said say VBD blog-dshr-org-2470 319 26 . . . blog-dshr-org-2470 320 1 However however RB blog-dshr-org-2470 320 2 , , , blog-dshr-org-2470 320 3 five five CD blog-dshr-org-2470 320 4 years year NNS blog-dshr-org-2470 320 5 since since IN blog-dshr-org-2470 320 6 the the DT blog-dshr-org-2470 320 7 Equation Equation NNP blog-dshr-org-2470 320 8 Group Group NNP blog-dshr-org-2470 320 9 's 's POS blog-dshr-org-2470 320 10 HDD HDD NNP blog-dshr-org-2470 320 11 implants implant NNS blog-dshr-org-2470 320 12 were be VBD blog-dshr-org-2470 320 13 found find VBN blog-dshr-org-2470 320 14 in in IN blog-dshr-org-2470 320 15 the the DT blog-dshr-org-2470 320 16 wild wild NN blog-dshr-org-2470 320 17 and and CC blog-dshr-org-2470 320 18 introduced introduce VBD blog-dshr-org-2470 320 19 the the DT blog-dshr-org-2470 320 20 hardware hardware NN blog-dshr-org-2470 320 21 industry industry NN blog-dshr-org-2470 320 22 to to IN blog-dshr-org-2470 320 23 the the DT blog-dshr-org-2470 320 24 power power NN blog-dshr-org-2470 320 25 of of IN blog-dshr-org-2470 320 26 firmware firmware JJ blog-dshr-org-2470 320 27 hacking hacking NN blog-dshr-org-2470 320 28 , , , blog-dshr-org-2470 320 29 Eclypsium Eclypsium NNP blog-dshr-org-2470 320 30 says say VBZ blog-dshr-org-2470 320 31 vendors vendor NNS blog-dshr-org-2470 320 32 have have VBP blog-dshr-org-2470 320 33 only only RB blog-dshr-org-2470 320 34 partially partially RB blog-dshr-org-2470 320 35 addressed address VBN blog-dshr-org-2470 320 36 this this DT blog-dshr-org-2470 320 37 problem problem NN blog-dshr-org-2470 320 38 . . . blog-dshr-org-2470 321 1 " " `` blog-dshr-org-2470 321 2 After after IN blog-dshr-org-2470 321 3 the the DT blog-dshr-org-2470 321 4 disclosure disclosure NN blog-dshr-org-2470 321 5 of of IN blog-dshr-org-2470 321 6 the the DT blog-dshr-org-2470 321 7 Equation Equation NNP blog-dshr-org-2470 321 8 Group Group NNP blog-dshr-org-2470 321 9 's 's POS blog-dshr-org-2470 321 10 drive drive NN blog-dshr-org-2470 321 11 implants implant NNS blog-dshr-org-2470 321 12 , , , blog-dshr-org-2470 321 13 many many JJ blog-dshr-org-2470 321 14 HDD HDD NNP blog-dshr-org-2470 321 15 and and CC blog-dshr-org-2470 321 16 SSD SSD NNP blog-dshr-org-2470 321 17 vendors vendor NNS blog-dshr-org-2470 321 18 made make VBD blog-dshr-org-2470 321 19 changes change NNS blog-dshr-org-2470 321 20 to to TO blog-dshr-org-2470 321 21 ensure ensure VB blog-dshr-org-2470 321 22 their -PRON- PRP$ blog-dshr-org-2470 321 23 components component NNS blog-dshr-org-2470 321 24 would would MD blog-dshr-org-2470 321 25 only only RB blog-dshr-org-2470 321 26 accept accept VB blog-dshr-org-2470 321 27 valid valid JJ blog-dshr-org-2470 321 28 firmware firmware NN blog-dshr-org-2470 321 29 . . . blog-dshr-org-2470 322 1 However however RB blog-dshr-org-2470 322 2 , , , blog-dshr-org-2470 322 3 many many JJ blog-dshr-org-2470 322 4 of of IN blog-dshr-org-2470 322 5 the the DT blog-dshr-org-2470 322 6 other other JJ blog-dshr-org-2470 322 7 peripheral peripheral JJ blog-dshr-org-2470 322 8 components component NNS blog-dshr-org-2470 322 9 have have VBP blog-dshr-org-2470 322 10 yet yet RB blog-dshr-org-2470 322 11 to to TO blog-dshr-org-2470 322 12 follow follow VB blog-dshr-org-2470 322 13 suit suit NN blog-dshr-org-2470 322 14 , , , blog-dshr-org-2470 322 15 " " '' blog-dshr-org-2470 322 16 researchers researcher NNS blog-dshr-org-2470 322 17 said say VBD blog-dshr-org-2470 322 18 . . . blog-dshr-org-2470 322 19 " " '' blog-dshr-org-2470 323 1 February February NNP blog-dshr-org-2470 323 2 20 20 CD blog-dshr-org-2470 323 3 , , , blog-dshr-org-2470 323 4 2020 2020 CD blog-dshr-org-2470 323 5 at at IN blog-dshr-org-2470 323 6 5:23 5:23 CD blog-dshr-org-2470 323 7 PM pm NN blog-dshr-org-2470 323 8 David David NNP blog-dshr-org-2470 323 9 . . . blog-dshr-org-2470 324 1 said say VBD blog-dshr-org-2470 324 2 ... ... : blog-dshr-org-2470 324 3 Marc Marc NNP blog-dshr-org-2470 324 4 Ohm Ohm NNP blog-dshr-org-2470 324 5 et et FW blog-dshr-org-2470 324 6 al al NNP blog-dshr-org-2470 324 7 analyze analyze VB blog-dshr-org-2470 324 8 supply supply NN blog-dshr-org-2470 324 9 chain chain NN blog-dshr-org-2470 324 10 attacks attack NNS blog-dshr-org-2470 324 11 via via IN blog-dshr-org-2470 324 12 open open JJ blog-dshr-org-2470 324 13 source source NN blog-dshr-org-2470 324 14 packages package NNS blog-dshr-org-2470 324 15 in in IN blog-dshr-org-2470 324 16 three three CD blog-dshr-org-2470 324 17 reposiotries reposiotrie NNS blog-dshr-org-2470 324 18 in in IN blog-dshr-org-2470 324 19 Backstabber Backstabber NNP blog-dshr-org-2470 324 20 ’s ’s POS blog-dshr-org-2470 324 21 Knife Knife NNP blog-dshr-org-2470 324 22 Collection Collection NNP blog-dshr-org-2470 324 23 : : : blog-dshr-org-2470 324 24 A a DT blog-dshr-org-2470 324 25 Review Review NNP blog-dshr-org-2470 324 26 of of IN blog-dshr-org-2470 324 27 Open Open NNP blog-dshr-org-2470 324 28 Source Source NNP blog-dshr-org-2470 324 29 Software Software NNP blog-dshr-org-2470 324 30 Supply Supply NNP blog-dshr-org-2470 324 31 Chain chain NN blog-dshr-org-2470 324 32 Attacks attack NNS blog-dshr-org-2470 324 33 : : : blog-dshr-org-2470 324 34 " " `` blog-dshr-org-2470 324 35 This this DT blog-dshr-org-2470 324 36 paper paper NN blog-dshr-org-2470 324 37 presents present VBZ blog-dshr-org-2470 324 38 a a DT blog-dshr-org-2470 324 39 dataset dataset NN blog-dshr-org-2470 324 40 of of IN blog-dshr-org-2470 324 41 174 174 CD blog-dshr-org-2470 324 42 malicious malicious JJ blog-dshr-org-2470 324 43 software software NN blog-dshr-org-2470 324 44 packages package NNS blog-dshr-org-2470 324 45 that that WDT blog-dshr-org-2470 324 46 were be VBD blog-dshr-org-2470 324 47 used use VBN blog-dshr-org-2470 324 48 in in IN blog-dshr-org-2470 324 49 real real JJ blog-dshr-org-2470 324 50 - - HYPH blog-dshr-org-2470 324 51 world world NN blog-dshr-org-2470 324 52 attacks attack NNS blog-dshr-org-2470 324 53 on on IN blog-dshr-org-2470 324 54 open open JJ blog-dshr-org-2470 324 55 source source NN blog-dshr-org-2470 324 56 software software NN blog-dshr-org-2470 324 57 supply supply NN blog-dshr-org-2470 324 58 chains chain NNS blog-dshr-org-2470 324 59 , , , blog-dshr-org-2470 324 60 and and CC blog-dshr-org-2470 324 61 which which WDT blog-dshr-org-2470 324 62 were be VBD blog-dshr-org-2470 324 63 distributed distribute VBN blog-dshr-org-2470 324 64 via via IN blog-dshr-org-2470 324 65 the the DT blog-dshr-org-2470 324 66 popular popular JJ blog-dshr-org-2470 324 67 package package NN blog-dshr-org-2470 324 68 repositories repositorie VBZ blog-dshr-org-2470 324 69 npm npm NN blog-dshr-org-2470 324 70 , , , blog-dshr-org-2470 324 71 PyPI pypi NN blog-dshr-org-2470 324 72 , , , blog-dshr-org-2470 324 73 and and CC blog-dshr-org-2470 324 74 RubyGems RubyGems NNP blog-dshr-org-2470 324 75 . . . blog-dshr-org-2470 325 1 Those those DT blog-dshr-org-2470 325 2 packages package NNS blog-dshr-org-2470 325 3 , , , blog-dshr-org-2470 325 4 dating date VBG blog-dshr-org-2470 325 5 from from IN blog-dshr-org-2470 325 6 November November NNP blog-dshr-org-2470 325 7 2015 2015 CD blog-dshr-org-2470 325 8 to to IN blog-dshr-org-2470 325 9 November November NNP blog-dshr-org-2470 325 10 2019 2019 CD blog-dshr-org-2470 325 11 , , , blog-dshr-org-2470 325 12 were be VBD blog-dshr-org-2470 325 13 manually manually RB blog-dshr-org-2470 325 14 collected collect VBN blog-dshr-org-2470 325 15 and and CC blog-dshr-org-2470 325 16 analyzed analyze VBN blog-dshr-org-2470 325 17 . . . blog-dshr-org-2470 326 1 The the DT blog-dshr-org-2470 326 2 paper paper NN blog-dshr-org-2470 326 3 also also RB blog-dshr-org-2470 326 4 presents present VBZ blog-dshr-org-2470 326 5 two two CD blog-dshr-org-2470 326 6 general general JJ blog-dshr-org-2470 326 7 attack attack NN blog-dshr-org-2470 326 8 trees tree NNS blog-dshr-org-2470 326 9 to to TO blog-dshr-org-2470 326 10 provide provide VB blog-dshr-org-2470 326 11 a a DT blog-dshr-org-2470 326 12 structured structured JJ blog-dshr-org-2470 326 13 overview overview NN blog-dshr-org-2470 326 14 about about IN blog-dshr-org-2470 326 15 techniques technique NNS blog-dshr-org-2470 326 16 to to TO blog-dshr-org-2470 326 17 inject inject VB blog-dshr-org-2470 326 18 malicious malicious JJ blog-dshr-org-2470 326 19 code code NN blog-dshr-org-2470 326 20 into into IN blog-dshr-org-2470 326 21 the the DT blog-dshr-org-2470 326 22 dependency dependency NN blog-dshr-org-2470 326 23 tree tree NN blog-dshr-org-2470 326 24 of of IN blog-dshr-org-2470 326 25 downstream downstream JJ blog-dshr-org-2470 326 26 users user NNS blog-dshr-org-2470 326 27 , , , blog-dshr-org-2470 326 28 and and CC blog-dshr-org-2470 326 29 to to TO blog-dshr-org-2470 326 30 execute execute VB blog-dshr-org-2470 326 31 such such JJ blog-dshr-org-2470 326 32 code code NN blog-dshr-org-2470 326 33 at at IN blog-dshr-org-2470 326 34 different different JJ blog-dshr-org-2470 326 35 times time NNS blog-dshr-org-2470 326 36 and and CC blog-dshr-org-2470 326 37 under under IN blog-dshr-org-2470 326 38 different different JJ blog-dshr-org-2470 326 39 conditions condition NNS blog-dshr-org-2470 326 40 . . . blog-dshr-org-2470 326 41 " " '' blog-dshr-org-2470 327 1 May May NNP blog-dshr-org-2470 327 2 30 30 CD blog-dshr-org-2470 327 3 , , , blog-dshr-org-2470 327 4 2020 2020 CD blog-dshr-org-2470 327 5 at at IN blog-dshr-org-2470 327 6 7:37 7:37 CD blog-dshr-org-2470 327 7 AM am NN blog-dshr-org-2470 327 8 David David NNP blog-dshr-org-2470 327 9 . . . blog-dshr-org-2470 328 1 said say VBD blog-dshr-org-2470 328 2 ... ... : blog-dshr-org-2470 328 3 Bruce Bruce NNP blog-dshr-org-2470 328 4 Schneier Schneier NNP blog-dshr-org-2470 328 5 's 's POS blog-dshr-org-2470 328 6 Survey Survey NNP blog-dshr-org-2470 328 7 of of IN blog-dshr-org-2470 328 8 Supply Supply NNP blog-dshr-org-2470 328 9 Chain Chain NNP blog-dshr-org-2470 328 10 Attacks Attacks NNPS blog-dshr-org-2470 328 11 starts start VBZ blog-dshr-org-2470 328 12 : : : blog-dshr-org-2470 328 13 " " `` blog-dshr-org-2470 328 14 The the DT blog-dshr-org-2470 328 15 Atlantic Atlantic NNP blog-dshr-org-2470 328 16 Council Council NNP blog-dshr-org-2470 328 17 has have VBZ blog-dshr-org-2470 328 18 a a DT blog-dshr-org-2470 328 19 released release VBN blog-dshr-org-2470 328 20 a a DT blog-dshr-org-2470 328 21 report report NN blog-dshr-org-2470 328 22 that that WDT blog-dshr-org-2470 328 23 looks look VBZ blog-dshr-org-2470 328 24 at at IN blog-dshr-org-2470 328 25 the the DT blog-dshr-org-2470 328 26 history history NN blog-dshr-org-2470 328 27 of of IN blog-dshr-org-2470 328 28 computer computer NN blog-dshr-org-2470 328 29 supply supply NN blog-dshr-org-2470 328 30 chain chain NN blog-dshr-org-2470 328 31 attacks attack NNS blog-dshr-org-2470 328 32 . . . blog-dshr-org-2470 328 33 " " '' blog-dshr-org-2470 329 1 The the DT blog-dshr-org-2470 329 2 Atlantic Atlantic NNP blog-dshr-org-2470 329 3 Council Council NNP blog-dshr-org-2470 329 4 also also RB blog-dshr-org-2470 329 5 has have VBZ blog-dshr-org-2470 329 6 a a DT blog-dshr-org-2470 329 7 summary summary NN blog-dshr-org-2470 329 8 of of IN blog-dshr-org-2470 329 9 the the DT blog-dshr-org-2470 329 10 report report NN blog-dshr-org-2470 329 11 entitled entitle VBN blog-dshr-org-2470 329 12 Breaking Breaking NNP blog-dshr-org-2470 329 13 trust trust NN blog-dshr-org-2470 329 14 : : : blog-dshr-org-2470 329 15 Shades shade NNS blog-dshr-org-2470 329 16 of of IN blog-dshr-org-2470 329 17 crisis crisis NN blog-dshr-org-2470 329 18 across across IN blog-dshr-org-2470 329 19 an an DT blog-dshr-org-2470 329 20 insecure insecure JJ blog-dshr-org-2470 329 21 software software NN blog-dshr-org-2470 329 22 supply supply NN blog-dshr-org-2470 329 23 chain chain NN blog-dshr-org-2470 329 24 : : : blog-dshr-org-2470 329 25 " " `` blog-dshr-org-2470 329 26 Software software NN blog-dshr-org-2470 329 27 supply supply NN blog-dshr-org-2470 329 28 chain chain NN blog-dshr-org-2470 329 29 security security NN blog-dshr-org-2470 329 30 remains remain VBZ blog-dshr-org-2470 329 31 an an DT blog-dshr-org-2470 329 32 under under RB blog-dshr-org-2470 329 33 - - HYPH blog-dshr-org-2470 329 34 appreciated appreciate VBN blog-dshr-org-2470 329 35 domain domain NN blog-dshr-org-2470 329 36 of of IN blog-dshr-org-2470 329 37 national national JJ blog-dshr-org-2470 329 38 security security NN blog-dshr-org-2470 329 39 policymaking policymaking NN blog-dshr-org-2470 329 40 . . . blog-dshr-org-2470 330 1 Working work VBG blog-dshr-org-2470 330 2 to to TO blog-dshr-org-2470 330 3 improve improve VB blog-dshr-org-2470 330 4 the the DT blog-dshr-org-2470 330 5 security security NN blog-dshr-org-2470 330 6 of of IN blog-dshr-org-2470 330 7 software software NN blog-dshr-org-2470 330 8 supporting support VBG blog-dshr-org-2470 330 9 private private JJ blog-dshr-org-2470 330 10 sector sector NN blog-dshr-org-2470 330 11 enterprise enterprise NN blog-dshr-org-2470 330 12 as as RB blog-dshr-org-2470 330 13 well well RB blog-dshr-org-2470 330 14 as as IN blog-dshr-org-2470 330 15 sensitive sensitive JJ blog-dshr-org-2470 330 16 Defense Defense NNP blog-dshr-org-2470 330 17 and and CC blog-dshr-org-2470 330 18 Intelligence Intelligence NNP blog-dshr-org-2470 330 19 organizations organization NNS blog-dshr-org-2470 330 20 requires require VBZ blog-dshr-org-2470 330 21 more more RBR blog-dshr-org-2470 330 22 coherent coherent JJ blog-dshr-org-2470 330 23 policy policy NN blog-dshr-org-2470 330 24 response response NN blog-dshr-org-2470 330 25 together together RB blog-dshr-org-2470 330 26 industry industry NN blog-dshr-org-2470 330 27 and and CC blog-dshr-org-2470 330 28 open open JJ blog-dshr-org-2470 330 29 source source NN blog-dshr-org-2470 330 30 communities community NNS blog-dshr-org-2470 330 31 . . . blog-dshr-org-2470 331 1 This this DT blog-dshr-org-2470 331 2 report report NN blog-dshr-org-2470 331 3 profiles profile VBZ blog-dshr-org-2470 331 4 115 115 CD blog-dshr-org-2470 331 5 attacks attack NNS blog-dshr-org-2470 331 6 and and CC blog-dshr-org-2470 331 7 disclosures disclosure NNS blog-dshr-org-2470 331 8 against against IN blog-dshr-org-2470 331 9 the the DT blog-dshr-org-2470 331 10 software software NN blog-dshr-org-2470 331 11 supply supply NN blog-dshr-org-2470 331 12 chain chain NN blog-dshr-org-2470 331 13 from from IN blog-dshr-org-2470 331 14 the the DT blog-dshr-org-2470 331 15 past past JJ blog-dshr-org-2470 331 16 decade decade NN blog-dshr-org-2470 331 17 to to TO blog-dshr-org-2470 331 18 highlight highlight VB blog-dshr-org-2470 331 19 the the DT blog-dshr-org-2470 331 20 need need NN blog-dshr-org-2470 331 21 for for IN blog-dshr-org-2470 331 22 action action NN blog-dshr-org-2470 331 23 and and CC blog-dshr-org-2470 331 24 presents present VBZ blog-dshr-org-2470 331 25 recommendations recommendation NNS blog-dshr-org-2470 331 26 to to TO blog-dshr-org-2470 331 27 both both DT blog-dshr-org-2470 331 28 raise raise VB blog-dshr-org-2470 331 29 the the DT blog-dshr-org-2470 331 30 cost cost NN blog-dshr-org-2470 331 31 of of IN blog-dshr-org-2470 331 32 these these DT blog-dshr-org-2470 331 33 attacks attack NNS blog-dshr-org-2470 331 34 and and CC blog-dshr-org-2470 331 35 limit limit VB blog-dshr-org-2470 331 36 their -PRON- PRP$ blog-dshr-org-2470 331 37 harm harm NN blog-dshr-org-2470 331 38 . . . blog-dshr-org-2470 331 39 " " '' blog-dshr-org-2470 332 1 July July NNP blog-dshr-org-2470 332 2 29 29 CD blog-dshr-org-2470 332 3 , , , blog-dshr-org-2470 332 4 2020 2020 CD blog-dshr-org-2470 332 5 at at IN blog-dshr-org-2470 332 6 4:56 4:56 CD blog-dshr-org-2470 332 7 PM PM NNP blog-dshr-org-2470 332 8 David David NNP blog-dshr-org-2470 332 9 . . . blog-dshr-org-2470 333 1 said say VBD blog-dshr-org-2470 333 2 ... ... : blog-dshr-org-2470 334 1 Via via IN blog-dshr-org-2470 334 2 my -PRON- PRP$ blog-dshr-org-2470 334 3 friend friend NN blog-dshr-org-2470 334 4 Jim Jim NNP blog-dshr-org-2470 334 5 Gettys Gettys NNP blog-dshr-org-2470 334 6 , , , blog-dshr-org-2470 334 7 we -PRON- PRP blog-dshr-org-2470 334 8 learn learn VBP blog-dshr-org-2470 334 9 of of IN blog-dshr-org-2470 334 10 a a DT blog-dshr-org-2470 334 11 major major JJ blog-dshr-org-2470 334 12 milestone milestone NN blog-dshr-org-2470 334 13 in in IN blog-dshr-org-2470 334 14 the the DT blog-dshr-org-2470 334 15 development development NN blog-dshr-org-2470 334 16 of of IN blog-dshr-org-2470 334 17 a a DT blog-dshr-org-2470 334 18 truly truly RB blog-dshr-org-2470 334 19 reproducible reproducible JJ blog-dshr-org-2470 334 20 build build NN blog-dshr-org-2470 334 21 environment environment NN blog-dshr-org-2470 334 22 . . . blog-dshr-org-2470 335 1 Last last JJ blog-dshr-org-2470 335 2 June June NNP blog-dshr-org-2470 335 3 Jan Jan NNP blog-dshr-org-2470 335 4 Nieuwenhuizen Nieuwenhuizen NNP blog-dshr-org-2470 335 5 posted post VBD blog-dshr-org-2470 335 6 Guix Guix NNP blog-dshr-org-2470 335 7 Further further RB blog-dshr-org-2470 335 8 Reduces reduce VBZ blog-dshr-org-2470 335 9 Bootstrap Bootstrap NNP blog-dshr-org-2470 335 10 Seed seed NN blog-dshr-org-2470 335 11 to to IN blog-dshr-org-2470 335 12 25 25 CD blog-dshr-org-2470 335 13 % % NN blog-dshr-org-2470 335 14 . . . blog-dshr-org-2470 336 1 The the DT blog-dshr-org-2470 336 2 TL;DR TL;DR NNS blog-dshr-org-2470 336 3 is be VBZ blog-dshr-org-2470 336 4 : : : blog-dshr-org-2470 336 5 " " `` blog-dshr-org-2470 336 6 GNU GNU NNP blog-dshr-org-2470 336 7 Mes Mes NNP blog-dshr-org-2470 336 8 is be VBZ blog-dshr-org-2470 336 9 closely closely RB blog-dshr-org-2470 336 10 related relate VBN blog-dshr-org-2470 336 11 to to IN blog-dshr-org-2470 336 12 the the DT blog-dshr-org-2470 336 13 Bootstrappable Bootstrappable NNP blog-dshr-org-2470 336 14 Builds Builds NNPS blog-dshr-org-2470 336 15 project project NN blog-dshr-org-2470 336 16 . . . blog-dshr-org-2470 337 1 Mes Mes NNP blog-dshr-org-2470 337 2 aims aim VBZ blog-dshr-org-2470 337 3 to to TO blog-dshr-org-2470 337 4 create create VB blog-dshr-org-2470 337 5 an an DT blog-dshr-org-2470 337 6 entirely entirely RB blog-dshr-org-2470 337 7 source source NN blog-dshr-org-2470 337 8 - - HYPH blog-dshr-org-2470 337 9 based base VBN blog-dshr-org-2470 337 10 bootstrapping bootstrappe VBG blog-dshr-org-2470 337 11 path path NN blog-dshr-org-2470 337 12 for for IN blog-dshr-org-2470 337 13 the the DT blog-dshr-org-2470 337 14 Guix Guix NNP blog-dshr-org-2470 337 15 System System NNP blog-dshr-org-2470 337 16 and and CC blog-dshr-org-2470 337 17 other other JJ blog-dshr-org-2470 337 18 interested interested JJ blog-dshr-org-2470 337 19 GNU GNU NNP blog-dshr-org-2470 337 20 / / SYM blog-dshr-org-2470 337 21 Linux Linux NNP blog-dshr-org-2470 337 22 distributions distribution NNS blog-dshr-org-2470 337 23 . . . blog-dshr-org-2470 338 1 The the DT blog-dshr-org-2470 338 2 goal goal NN blog-dshr-org-2470 338 3 is be VBZ blog-dshr-org-2470 338 4 to to TO blog-dshr-org-2470 338 5 start start VB blog-dshr-org-2470 338 6 from from IN blog-dshr-org-2470 338 7 a a DT blog-dshr-org-2470 338 8 minimal minimal JJ blog-dshr-org-2470 338 9 , , , blog-dshr-org-2470 338 10 easily easily RB blog-dshr-org-2470 338 11 inspectable inspectable JJ blog-dshr-org-2470 338 12 binary binary NN blog-dshr-org-2470 338 13 ( ( -LRB- blog-dshr-org-2470 338 14 which which WDT blog-dshr-org-2470 338 15 should should MD blog-dshr-org-2470 338 16 be be VB blog-dshr-org-2470 338 17 readable readable JJ blog-dshr-org-2470 338 18 as as IN blog-dshr-org-2470 338 19 source source NN blog-dshr-org-2470 338 20 ) ) -RRB- blog-dshr-org-2470 338 21 and and CC blog-dshr-org-2470 338 22 bootstrap bootstrap VB blog-dshr-org-2470 338 23 into into IN blog-dshr-org-2470 338 24 something something NN blog-dshr-org-2470 338 25 close close JJ blog-dshr-org-2470 338 26 to to IN blog-dshr-org-2470 338 27 R6RS r6rs ADD blog-dshr-org-2470 338 28 Scheme Scheme NNP blog-dshr-org-2470 338 29 . . . blog-dshr-org-2470 339 1 Currently currently RB blog-dshr-org-2470 339 2 , , , blog-dshr-org-2470 339 3 Mes Mes NNP blog-dshr-org-2470 339 4 consists consist VBZ blog-dshr-org-2470 339 5 of of IN blog-dshr-org-2470 339 6 a a DT blog-dshr-org-2470 339 7 mutual mutual JJ blog-dshr-org-2470 339 8 self self NN blog-dshr-org-2470 339 9 - - HYPH blog-dshr-org-2470 339 10 hosting host VBG blog-dshr-org-2470 339 11 scheme scheme NN blog-dshr-org-2470 339 12 interpreter interpreter NN blog-dshr-org-2470 339 13 and and CC blog-dshr-org-2470 339 14 C C NNP blog-dshr-org-2470 339 15 compiler compiler NN blog-dshr-org-2470 339 16 . . . blog-dshr-org-2470 340 1 It -PRON- PRP blog-dshr-org-2470 340 2 also also RB blog-dshr-org-2470 340 3 implements implement VBZ blog-dshr-org-2470 340 4 a a DT blog-dshr-org-2470 340 5 C C NNP blog-dshr-org-2470 340 6 library library NN blog-dshr-org-2470 340 7 . . . blog-dshr-org-2470 341 1 Mes Mes NNP blog-dshr-org-2470 341 2 , , , blog-dshr-org-2470 341 3 the the DT blog-dshr-org-2470 341 4 scheme scheme NN blog-dshr-org-2470 341 5 interpreter interpreter NN blog-dshr-org-2470 341 6 , , , blog-dshr-org-2470 341 7 is be VBZ blog-dshr-org-2470 341 8 written write VBN blog-dshr-org-2470 341 9 in in IN blog-dshr-org-2470 341 10 about about RB blog-dshr-org-2470 341 11 5,000 5,000 CD blog-dshr-org-2470 341 12 lines line NNS blog-dshr-org-2470 341 13 of of IN blog-dshr-org-2470 341 14 code code NN blog-dshr-org-2470 341 15 of of IN blog-dshr-org-2470 341 16 simple simple JJ blog-dshr-org-2470 341 17 C. C. NNP blog-dshr-org-2470 341 18 MesCC MesCC NNP blog-dshr-org-2470 341 19 , , , blog-dshr-org-2470 341 20 the the DT blog-dshr-org-2470 341 21 C C NNP blog-dshr-org-2470 341 22 compiler compiler NN blog-dshr-org-2470 341 23 , , , blog-dshr-org-2470 341 24 is be VBZ blog-dshr-org-2470 341 25 written write VBN blog-dshr-org-2470 341 26 in in IN blog-dshr-org-2470 341 27 scheme scheme NN blog-dshr-org-2470 341 28 . . . blog-dshr-org-2470 342 1 Together together RB blog-dshr-org-2470 342 2 , , , blog-dshr-org-2470 342 3 Mes Mes NNP blog-dshr-org-2470 342 4 and and CC blog-dshr-org-2470 342 5 MesCC MesCC NNP blog-dshr-org-2470 342 6 can can MD blog-dshr-org-2470 342 7 compile compile VB blog-dshr-org-2470 342 8 a a DT blog-dshr-org-2470 342 9 lightly lightly RB blog-dshr-org-2470 342 10 patched patch VBN blog-dshr-org-2470 342 11 TinyCC TinyCC NNP blog-dshr-org-2470 342 12 that that WDT blog-dshr-org-2470 342 13 is be VBZ blog-dshr-org-2470 342 14 self self NN blog-dshr-org-2470 342 15 - - HYPH blog-dshr-org-2470 342 16 hosting hosting NN blog-dshr-org-2470 342 17 . . . blog-dshr-org-2470 343 1 Using use VBG blog-dshr-org-2470 343 2 this this DT blog-dshr-org-2470 343 3 TinyCC TinyCC NNP blog-dshr-org-2470 343 4 and and CC blog-dshr-org-2470 343 5 the the DT blog-dshr-org-2470 343 6 Mes Mes NNP blog-dshr-org-2470 343 7 C C NNP blog-dshr-org-2470 343 8 library library NN blog-dshr-org-2470 343 9 , , , blog-dshr-org-2470 343 10 it -PRON- PRP blog-dshr-org-2470 343 11 is be VBZ blog-dshr-org-2470 343 12 possible possible JJ blog-dshr-org-2470 343 13 to to TO blog-dshr-org-2470 343 14 bootstrap bootstrap VB blog-dshr-org-2470 343 15 the the DT blog-dshr-org-2470 343 16 entire entire JJ blog-dshr-org-2470 343 17 Guix Guix NNP blog-dshr-org-2470 343 18 System System NNP blog-dshr-org-2470 343 19 for for IN blog-dshr-org-2470 343 20 i686-linux i686-linux NNP blog-dshr-org-2470 343 21 and and CC blog-dshr-org-2470 343 22 x86_64-linux x86_64-linux NNP blog-dshr-org-2470 343 23 . . . blog-dshr-org-2470 343 24 " " '' blog-dshr-org-2470 344 1 The the DT blog-dshr-org-2470 344 2 binary binary NN blog-dshr-org-2470 344 3 they -PRON- PRP blog-dshr-org-2470 344 4 plan plan VBP blog-dshr-org-2470 344 5 to to TO blog-dshr-org-2470 344 6 start start VB blog-dshr-org-2470 344 7 from from IN blog-dshr-org-2470 344 8 is be VBZ blog-dshr-org-2470 344 9 : : : blog-dshr-org-2470 344 10 " " `` blog-dshr-org-2470 344 11 Our -PRON- PRP$ blog-dshr-org-2470 344 12 next next JJ blog-dshr-org-2470 344 13 target target NN blog-dshr-org-2470 344 14 will will MD blog-dshr-org-2470 344 15 be be VB blog-dshr-org-2470 344 16 a a DT blog-dshr-org-2470 344 17 third third JJ blog-dshr-org-2470 344 18 reduction reduction NN blog-dshr-org-2470 344 19 by by IN blog-dshr-org-2470 344 20 ~50 ~50 NNP blog-dshr-org-2470 344 21 % % NN blog-dshr-org-2470 344 22 ; ; , blog-dshr-org-2470 344 23 the the DT blog-dshr-org-2470 344 24 Full Full NNP blog-dshr-org-2470 344 25 - - HYPH blog-dshr-org-2470 344 26 Source source NN blog-dshr-org-2470 344 27 bootstrap bootstrap NN blog-dshr-org-2470 344 28 will will MD blog-dshr-org-2470 344 29 replace replace VB blog-dshr-org-2470 344 30 the the DT blog-dshr-org-2470 344 31 MesCC MesCC NNP blog-dshr-org-2470 344 32 - - HYPH blog-dshr-org-2470 344 33 Tools Tools NNPS blog-dshr-org-2470 344 34 and and CC blog-dshr-org-2470 344 35 GNU GNU NNP blog-dshr-org-2470 344 36 Mes Mes NNP blog-dshr-org-2470 344 37 binaries binary NNS blog-dshr-org-2470 344 38 by by IN blog-dshr-org-2470 344 39 Stage0 Stage0 NNP blog-dshr-org-2470 344 40 and and CC blog-dshr-org-2470 344 41 M2-Planet M2-Planet NNP blog-dshr-org-2470 344 42 . . . blog-dshr-org-2470 345 1 The the DT blog-dshr-org-2470 345 2 Stage0 Stage0 NNP blog-dshr-org-2470 345 3 project project NN blog-dshr-org-2470 345 4 by by IN blog-dshr-org-2470 345 5 Jeremiah Jeremiah NNP blog-dshr-org-2470 345 6 Orians Orians NNP blog-dshr-org-2470 345 7 starts start VBZ blog-dshr-org-2470 345 8 everything everything NN blog-dshr-org-2470 345 9 from from IN blog-dshr-org-2470 345 10 ~512 ~512 NNP blog-dshr-org-2470 345 11 bytes byte NNS blog-dshr-org-2470 345 12 ; ; : blog-dshr-org-2470 345 13 virtually virtually RB blog-dshr-org-2470 345 14 nothing nothing NN blog-dshr-org-2470 345 15 . . . blog-dshr-org-2470 346 1 Have have VB blog-dshr-org-2470 346 2 a a DT blog-dshr-org-2470 346 3 look look NN blog-dshr-org-2470 346 4 at at IN blog-dshr-org-2470 346 5 this this DT blog-dshr-org-2470 346 6 incredible incredible JJ blog-dshr-org-2470 346 7 project project NN blog-dshr-org-2470 346 8 if if IN blog-dshr-org-2470 346 9 you -PRON- PRP blog-dshr-org-2470 346 10 have have VBP blog-dshr-org-2470 346 11 n’t not RB blog-dshr-org-2470 346 12 already already RB blog-dshr-org-2470 346 13 done do VBN blog-dshr-org-2470 346 14 so so RB blog-dshr-org-2470 346 15 . . . blog-dshr-org-2470 346 16 " " '' blog-dshr-org-2470 347 1 In in IN blog-dshr-org-2470 347 2 mid mid JJ blog-dshr-org-2470 347 3 November November NNP blog-dshr-org-2470 347 4 Nieuwenhuizen Nieuwenhuizen NNP blog-dshr-org-2470 347 5 tweeted tweet VBD blog-dshr-org-2470 347 6 : : : blog-dshr-org-2470 347 7 " " `` blog-dshr-org-2470 347 8 We -PRON- PRP blog-dshr-org-2470 347 9 just just RB blog-dshr-org-2470 347 10 compiled compile VBD blog-dshr-org-2470 347 11 the the DT blog-dshr-org-2470 347 12 first first JJ blog-dshr-org-2470 347 13 working working NN blog-dshr-org-2470 347 14 program program NN blog-dshr-org-2470 347 15 using use VBG blog-dshr-org-2470 347 16 a a DT blog-dshr-org-2470 347 17 Reduced Reduced NNP blog-dshr-org-2470 347 18 Binary Binary NNP blog-dshr-org-2470 347 19 Seed Seed NNP blog-dshr-org-2470 347 20 bootstrap'ped bootstrap'pe VBN blog-dshr-org-2470 347 21 * * NFP blog-dshr-org-2470 347 22 ) ) -RRB- blog-dshr-org-2470 347 23 TinyCC tinycc NN blog-dshr-org-2470 347 24 for for IN blog-dshr-org-2470 347 25 ARM arm NN blog-dshr-org-2470 347 26 " " '' blog-dshr-org-2470 347 27 And and CC blog-dshr-org-2470 347 28 on on IN blog-dshr-org-2470 347 29 December December NNP blog-dshr-org-2470 347 30 21 21 CD blog-dshr-org-2470 347 31 he -PRON- PRP blog-dshr-org-2470 347 32 tweeted tweet VBD blog-dshr-org-2470 347 33 : : : blog-dshr-org-2470 347 34 " " `` blog-dshr-org-2470 347 35 The the DT blog-dshr-org-2470 347 36 Reduced Reduced NNP blog-dshr-org-2470 347 37 Binary Binary NNP blog-dshr-org-2470 347 38 Seed Seed NNP blog-dshr-org-2470 347 39 bootstrap bootstrap NN blog-dshr-org-2470 347 40 is be VBZ blog-dshr-org-2470 347 41 coming come VBG blog-dshr-org-2470 347 42 to to IN blog-dshr-org-2470 347 43 ARM ARM NNP blog-dshr-org-2470 347 44 : : : blog-dshr-org-2470 347 45 Tiny tiny JJ blog-dshr-org-2470 347 46 C C NNP blog-dshr-org-2470 347 47 builds build VBZ blog-dshr-org-2470 347 48 on on IN blog-dshr-org-2470 347 49 @GuixHPC @GuixHPC NNP blog-dshr-org-2470 347 50 wip wip NN blog-dshr-org-2470 347 51 - - HYPH blog-dshr-org-2470 347 52 arm arm NN blog-dshr-org-2470 347 53 - - HYPH blog-dshr-org-2470 347 54 bootstrap bootstrap NN blog-dshr-org-2470 347 55 branch branch NN blog-dshr-org-2470 347 56 " " '' blog-dshr-org-2470 347 57 Starting start VBG blog-dshr-org-2470 347 58 from from IN blog-dshr-org-2470 347 59 a a DT blog-dshr-org-2470 347 60 working work VBG blog-dshr-org-2470 347 61 TinyCC TinyCC NNP blog-dshr-org-2470 347 62 , , , blog-dshr-org-2470 347 63 you -PRON- PRP blog-dshr-org-2470 347 64 can can MD blog-dshr-org-2470 347 65 build build VB blog-dshr-org-2470 347 66 the the DT blog-dshr-org-2470 347 67 current current JJ blog-dshr-org-2470 347 68 compiler compiler NN blog-dshr-org-2470 347 69 chain chain NN blog-dshr-org-2470 347 70 . . . blog-dshr-org-2470 348 1 December December NNP blog-dshr-org-2470 348 2 30 30 CD blog-dshr-org-2470 348 3 , , , blog-dshr-org-2470 348 4 2020 2020 CD blog-dshr-org-2470 348 5 at at IN blog-dshr-org-2470 348 6 3:26 3:26 CD blog-dshr-org-2470 348 7 PM pm NN blog-dshr-org-2470 348 8 Post Post NNP blog-dshr-org-2470 348 9 a a DT blog-dshr-org-2470 348 10 Comment Comment NNP blog-dshr-org-2470 348 11 Newer Newer NNP blog-dshr-org-2470 348 12 Post Post NNP blog-dshr-org-2470 348 13 Older Older NNP blog-dshr-org-2470 348 14 Post Post NNP blog-dshr-org-2470 348 15 Home Home NNP blog-dshr-org-2470 348 16 Subscribe Subscribe NNP blog-dshr-org-2470 348 17 to to TO blog-dshr-org-2470 348 18 : : : blog-dshr-org-2470 348 19 Post Post NNP blog-dshr-org-2470 348 20 Comments comment NNS blog-dshr-org-2470 348 21 ( ( -LRB- blog-dshr-org-2470 348 22 Atom atom NN blog-dshr-org-2470 348 23 ) ) -RRB- blog-dshr-org-2470 348 24 Blog Blog NNP blog-dshr-org-2470 348 25 Rules rule NNS blog-dshr-org-2470 348 26 Posts post NNS blog-dshr-org-2470 348 27 and and CC blog-dshr-org-2470 348 28 comments comment NNS blog-dshr-org-2470 348 29 are be VBP blog-dshr-org-2470 348 30 copyright copyright NN blog-dshr-org-2470 348 31 of of IN blog-dshr-org-2470 348 32 their -PRON- PRP$ blog-dshr-org-2470 348 33 respective respective JJ blog-dshr-org-2470 348 34 authors author NNS blog-dshr-org-2470 348 35 who who WP blog-dshr-org-2470 348 36 , , , blog-dshr-org-2470 348 37 by by IN blog-dshr-org-2470 348 38 posting post VBG blog-dshr-org-2470 348 39 or or CC blog-dshr-org-2470 348 40 commenting comment VBG blog-dshr-org-2470 348 41 , , , blog-dshr-org-2470 348 42 license license VBP blog-dshr-org-2470 348 43 their -PRON- PRP$ blog-dshr-org-2470 348 44 work work NN blog-dshr-org-2470 348 45 under under IN blog-dshr-org-2470 348 46 a a DT blog-dshr-org-2470 348 47 Creative Creative NNP blog-dshr-org-2470 348 48 Commons Commons NNP blog-dshr-org-2470 348 49 Attribution Attribution NNP blog-dshr-org-2470 348 50 - - HYPH blog-dshr-org-2470 348 51 Share Share NNP blog-dshr-org-2470 348 52 Alike alike RB blog-dshr-org-2470 348 53 3.0 3.0 CD blog-dshr-org-2470 348 54 United United NNP blog-dshr-org-2470 348 55 States States NNP blog-dshr-org-2470 348 56 License License NNP blog-dshr-org-2470 348 57 . . . blog-dshr-org-2470 349 1 Off off IN blog-dshr-org-2470 349 2 - - HYPH blog-dshr-org-2470 349 3 topic topic NN blog-dshr-org-2470 349 4 or or CC blog-dshr-org-2470 349 5 unsuitable unsuitable JJ blog-dshr-org-2470 349 6 comments comment NNS blog-dshr-org-2470 349 7 will will MD blog-dshr-org-2470 349 8 be be VB blog-dshr-org-2470 349 9 deleted delete VBN blog-dshr-org-2470 349 10 . . . blog-dshr-org-2470 350 1 DSHR DSHR NNP blog-dshr-org-2470 350 2 DSHR DSHR NNP blog-dshr-org-2470 350 3 in in IN blog-dshr-org-2470 350 4 ANWR ANWR NNP blog-dshr-org-2470 350 5 Recent recent JJ blog-dshr-org-2470 350 6 Comments comment NNS blog-dshr-org-2470 350 7 Full full JJ blog-dshr-org-2470 350 8 comments comment NNS blog-dshr-org-2470 350 9 Blog Blog NNP blog-dshr-org-2470 350 10 Archive Archive NNP blog-dshr-org-2470 350 11 ► ► NFP blog-dshr-org-2470 350 12     _SP blog-dshr-org-2470 350 13 2021 2021 CD blog-dshr-org-2470 350 14 ( ( -LRB- blog-dshr-org-2470 350 15 39 39 CD blog-dshr-org-2470 350 16 ) ) -RRB- blog-dshr-org-2470 350 17 ► ► NFP blog-dshr-org-2470 350 18     _SP blog-dshr-org-2470 350 19 August August NNP blog-dshr-org-2470 350 20 ( ( -LRB- blog-dshr-org-2470 350 21 2 2 CD blog-dshr-org-2470 350 22 ) ) -RRB- blog-dshr-org-2470 350 23 ► ► NFP blog-dshr-org-2470 350 24     _SP blog-dshr-org-2470 350 25 July July NNP blog-dshr-org-2470 350 26 ( ( -LRB- blog-dshr-org-2470 350 27 6 6 CD blog-dshr-org-2470 350 28 ) ) -RRB- blog-dshr-org-2470 350 29 ► ► NFP blog-dshr-org-2470 350 30     _SP blog-dshr-org-2470 350 31 June June NNP blog-dshr-org-2470 350 32 ( ( -LRB- blog-dshr-org-2470 350 33 8) 8) CD blog-dshr-org-2470 350 34 ► ► CD blog-dshr-org-2470 350 35     _SP blog-dshr-org-2470 350 36 May May NNP blog-dshr-org-2470 350 37 ( ( -LRB- blog-dshr-org-2470 350 38 4 4 CD blog-dshr-org-2470 350 39 ) ) -RRB- blog-dshr-org-2470 350 40 ► ► NFP blog-dshr-org-2470 350 41     _SP blog-dshr-org-2470 350 42 April April NNP blog-dshr-org-2470 350 43 ( ( -LRB- blog-dshr-org-2470 350 44 6 6 CD blog-dshr-org-2470 350 45 ) ) -RRB- blog-dshr-org-2470 350 46 ► ► NFP blog-dshr-org-2470 350 47     _SP blog-dshr-org-2470 350 48 March March NNP blog-dshr-org-2470 350 49 ( ( -LRB- blog-dshr-org-2470 350 50 3 3 CD blog-dshr-org-2470 350 51 ) ) -RRB- blog-dshr-org-2470 350 52 ► ► NFP blog-dshr-org-2470 350 53     _SP blog-dshr-org-2470 350 54 February February NNP blog-dshr-org-2470 350 55 ( ( -LRB- blog-dshr-org-2470 350 56 5 5 CD blog-dshr-org-2470 350 57 ) ) -RRB- blog-dshr-org-2470 350 58 ► ► NFP blog-dshr-org-2470 350 59     _SP blog-dshr-org-2470 350 60 January January NNP blog-dshr-org-2470 350 61 ( ( -LRB- blog-dshr-org-2470 350 62 5 5 CD blog-dshr-org-2470 350 63 ) ) -RRB- blog-dshr-org-2470 350 64 ► ► CD blog-dshr-org-2470 350 65     _SP blog-dshr-org-2470 350 66 2020 2020 CD blog-dshr-org-2470 350 67 ( ( -LRB- blog-dshr-org-2470 350 68 55 55 CD blog-dshr-org-2470 350 69 ) ) -RRB- blog-dshr-org-2470 350 70 ► ► NFP blog-dshr-org-2470 350 71     _SP blog-dshr-org-2470 350 72 December December NNP blog-dshr-org-2470 350 73 ( ( -LRB- blog-dshr-org-2470 350 74 4 4 CD blog-dshr-org-2470 350 75 ) ) -RRB- blog-dshr-org-2470 350 76 ► ► NFP blog-dshr-org-2470 350 77     _SP blog-dshr-org-2470 350 78 November November NNP blog-dshr-org-2470 350 79 ( ( -LRB- blog-dshr-org-2470 350 80 4 4 CD blog-dshr-org-2470 350 81 ) ) -RRB- blog-dshr-org-2470 350 82 ► ► NFP blog-dshr-org-2470 350 83     _SP blog-dshr-org-2470 350 84 October October NNP blog-dshr-org-2470 350 85 ( ( -LRB- blog-dshr-org-2470 350 86 3 3 CD blog-dshr-org-2470 350 87 ) ) -RRB- blog-dshr-org-2470 350 88 ► ► NFP blog-dshr-org-2470 350 89     _SP blog-dshr-org-2470 350 90 September September NNP blog-dshr-org-2470 350 91 ( ( -LRB- blog-dshr-org-2470 350 92 6 6 CD blog-dshr-org-2470 350 93 ) ) -RRB- blog-dshr-org-2470 350 94 ► ► NFP blog-dshr-org-2470 350 95     _SP blog-dshr-org-2470 350 96 August August NNP blog-dshr-org-2470 350 97 ( ( -LRB- blog-dshr-org-2470 350 98 5 5 CD blog-dshr-org-2470 350 99 ) ) -RRB- blog-dshr-org-2470 350 100 ► ► NFP blog-dshr-org-2470 350 101     _SP blog-dshr-org-2470 350 102 July July NNP blog-dshr-org-2470 350 103 ( ( -LRB- blog-dshr-org-2470 350 104 3 3 CD blog-dshr-org-2470 350 105 ) ) -RRB- blog-dshr-org-2470 350 106 ► ► NFP blog-dshr-org-2470 350 107     _SP blog-dshr-org-2470 350 108 June June NNP blog-dshr-org-2470 350 109 ( ( -LRB- blog-dshr-org-2470 350 110 6 6 CD blog-dshr-org-2470 350 111 ) ) -RRB- blog-dshr-org-2470 350 112 ► ► NFP blog-dshr-org-2470 350 113     _SP blog-dshr-org-2470 350 114 May May NNP blog-dshr-org-2470 350 115 ( ( -LRB- blog-dshr-org-2470 350 116 3 3 CD blog-dshr-org-2470 350 117 ) ) -RRB- blog-dshr-org-2470 350 118 ► ► NFP blog-dshr-org-2470 350 119     _SP blog-dshr-org-2470 350 120 April April NNP blog-dshr-org-2470 350 121 ( ( -LRB- blog-dshr-org-2470 350 122 5 5 CD blog-dshr-org-2470 350 123 ) ) -RRB- blog-dshr-org-2470 350 124 ► ► NFP blog-dshr-org-2470 350 125     _SP blog-dshr-org-2470 350 126 March March NNP blog-dshr-org-2470 350 127 ( ( -LRB- blog-dshr-org-2470 350 128 6 6 CD blog-dshr-org-2470 350 129 ) ) -RRB- blog-dshr-org-2470 350 130 ► ► NFP blog-dshr-org-2470 350 131     _SP blog-dshr-org-2470 350 132 February February NNP blog-dshr-org-2470 350 133 ( ( -LRB- blog-dshr-org-2470 350 134 5 5 CD blog-dshr-org-2470 350 135 ) ) -RRB- blog-dshr-org-2470 350 136 ► ► NFP blog-dshr-org-2470 350 137     _SP blog-dshr-org-2470 350 138 January January NNP blog-dshr-org-2470 350 139 ( ( -LRB- blog-dshr-org-2470 350 140 5 5 CD blog-dshr-org-2470 350 141 ) ) -RRB- blog-dshr-org-2470 350 142 ► ► CD blog-dshr-org-2470 350 143     _SP blog-dshr-org-2470 350 144 2019 2019 CD blog-dshr-org-2470 350 145 ( ( -LRB- blog-dshr-org-2470 350 146 66 66 CD blog-dshr-org-2470 350 147 ) ) -RRB- blog-dshr-org-2470 350 148 ► ► NFP blog-dshr-org-2470 350 149     _SP blog-dshr-org-2470 350 150 December December NNP blog-dshr-org-2470 350 151 ( ( -LRB- blog-dshr-org-2470 350 152 2 2 CD blog-dshr-org-2470 350 153 ) ) -RRB- blog-dshr-org-2470 350 154 ► ► NFP blog-dshr-org-2470 350 155     _SP blog-dshr-org-2470 350 156 November November NNP blog-dshr-org-2470 350 157 ( ( -LRB- blog-dshr-org-2470 350 158 4 4 CD blog-dshr-org-2470 350 159 ) ) -RRB- blog-dshr-org-2470 350 160 ► ► NFP blog-dshr-org-2470 350 161     _SP blog-dshr-org-2470 350 162 October October NNP blog-dshr-org-2470 350 163 ( ( -LRB- blog-dshr-org-2470 350 164 8) 8) CD blog-dshr-org-2470 350 165 ► ► CD blog-dshr-org-2470 350 166     _SP blog-dshr-org-2470 350 167 September September NNP blog-dshr-org-2470 350 168 ( ( -LRB- blog-dshr-org-2470 350 169 5 5 CD blog-dshr-org-2470 350 170 ) ) -RRB- blog-dshr-org-2470 350 171 ► ► NFP blog-dshr-org-2470 350 172     _SP blog-dshr-org-2470 350 173 August August NNP blog-dshr-org-2470 350 174 ( ( -LRB- blog-dshr-org-2470 350 175 5 5 CD blog-dshr-org-2470 350 176 ) ) -RRB- blog-dshr-org-2470 350 177 ► ► NFP blog-dshr-org-2470 350 178     _SP blog-dshr-org-2470 350 179 July July NNP blog-dshr-org-2470 350 180 ( ( -LRB- blog-dshr-org-2470 350 181 7 7 CD blog-dshr-org-2470 350 182 ) ) -RRB- blog-dshr-org-2470 350 183 ► ► NFP blog-dshr-org-2470 350 184     _SP blog-dshr-org-2470 350 185 June June NNP blog-dshr-org-2470 350 186 ( ( -LRB- blog-dshr-org-2470 350 187 6 6 CD blog-dshr-org-2470 350 188 ) ) -RRB- blog-dshr-org-2470 350 189 ► ► NFP blog-dshr-org-2470 350 190     _SP blog-dshr-org-2470 350 191 May May NNP blog-dshr-org-2470 350 192 ( ( -LRB- blog-dshr-org-2470 350 193 7 7 CD blog-dshr-org-2470 350 194 ) ) -RRB- blog-dshr-org-2470 350 195 ► ► NFP blog-dshr-org-2470 350 196     _SP blog-dshr-org-2470 350 197 April April NNP blog-dshr-org-2470 350 198 ( ( -LRB- blog-dshr-org-2470 350 199 6 6 CD blog-dshr-org-2470 350 200 ) ) -RRB- blog-dshr-org-2470 350 201 ► ► NFP blog-dshr-org-2470 350 202     _SP blog-dshr-org-2470 350 203 March March NNP blog-dshr-org-2470 350 204 ( ( -LRB- blog-dshr-org-2470 350 205 7 7 CD blog-dshr-org-2470 350 206 ) ) -RRB- blog-dshr-org-2470 350 207 ► ► NFP blog-dshr-org-2470 350 208     _SP blog-dshr-org-2470 350 209 February February NNP blog-dshr-org-2470 350 210 ( ( -LRB- blog-dshr-org-2470 350 211 4 4 CD blog-dshr-org-2470 350 212 ) ) -RRB- blog-dshr-org-2470 350 213 ► ► NFP blog-dshr-org-2470 350 214     _SP blog-dshr-org-2470 350 215 January January NNP blog-dshr-org-2470 350 216 ( ( -LRB- blog-dshr-org-2470 350 217 5 5 CD blog-dshr-org-2470 350 218 ) ) -RRB- blog-dshr-org-2470 350 219 ▼ ▼ CD blog-dshr-org-2470 350 220     _SP blog-dshr-org-2470 350 221 2018 2018 CD blog-dshr-org-2470 350 222 ( ( -LRB- blog-dshr-org-2470 350 223 96 96 CD blog-dshr-org-2470 350 224 ) ) -RRB- blog-dshr-org-2470 350 225 ▼ ▼ CD blog-dshr-org-2470 350 226     _SP blog-dshr-org-2470 350 227 December December NNP blog-dshr-org-2470 350 228 ( ( -LRB- blog-dshr-org-2470 350 229 7 7 CD blog-dshr-org-2470 350 230 ) ) -RRB- blog-dshr-org-2470 350 231 Securing secure VBG blog-dshr-org-2470 350 232 The the DT blog-dshr-org-2470 350 233 Hardware Hardware NNP blog-dshr-org-2470 350 234 Supply Supply NNP blog-dshr-org-2470 350 235 Chain Chain NNP blog-dshr-org-2470 350 236 Meta Meta NNP blog-dshr-org-2470 350 237 : : : blog-dshr-org-2470 350 238 Impending impend VBG blog-dshr-org-2470 350 239 Blog blog NN blog-dshr-org-2470 350 240 Slowdown slowdown NN blog-dshr-org-2470 350 241 Securing secure VBG blog-dshr-org-2470 350 242 The the DT blog-dshr-org-2470 350 243 Software Software NNP blog-dshr-org-2470 350 244 Supply supply NN blog-dshr-org-2470 350 245 Chain Chain NNP blog-dshr-org-2470 350 246 Software Software NNP blog-dshr-org-2470 350 247 Preservation Preservation NNP blog-dshr-org-2470 350 248 Network Network NNP blog-dshr-org-2470 350 249 Blockchain Blockchain NNP blog-dshr-org-2470 350 250 : : : blog-dshr-org-2470 350 251 What what WP blog-dshr-org-2470 350 252 's be VBZ blog-dshr-org-2470 350 253 Not not RB blog-dshr-org-2470 350 254 To to TO blog-dshr-org-2470 350 255 Like like VB blog-dshr-org-2470 350 256 ? ? . blog-dshr-org-2470 351 1 Irina Irina NNP blog-dshr-org-2470 351 2 Bolychevsky Bolychevsky NNP blog-dshr-org-2470 351 3 on on IN blog-dshr-org-2470 351 4 Solid solid JJ blog-dshr-org-2470 351 5 Selective Selective NNP blog-dshr-org-2470 351 6 Amnesia Amnesia NNP blog-dshr-org-2470 351 7 ► ► NFP blog-dshr-org-2470 351 8     _SP blog-dshr-org-2470 351 9 November November NNP blog-dshr-org-2470 351 10 ( ( -LRB- blog-dshr-org-2470 351 11 8) 8) CD blog-dshr-org-2470 351 12 ► ► CD blog-dshr-org-2470 351 13     _SP blog-dshr-org-2470 351 14 October October NNP blog-dshr-org-2470 351 15 ( ( -LRB- blog-dshr-org-2470 351 16 10 10 CD blog-dshr-org-2470 351 17 ) ) -RRB- blog-dshr-org-2470 351 18 ► ► NFP blog-dshr-org-2470 351 19     _SP blog-dshr-org-2470 351 20 September September NNP blog-dshr-org-2470 351 21 ( ( -LRB- blog-dshr-org-2470 351 22 5 5 CD blog-dshr-org-2470 351 23 ) ) -RRB- blog-dshr-org-2470 351 24 ► ► NFP blog-dshr-org-2470 351 25     _SP blog-dshr-org-2470 351 26 August August NNP blog-dshr-org-2470 351 27 ( ( -LRB- blog-dshr-org-2470 351 28 8) 8) CD blog-dshr-org-2470 351 29 ► ► CD blog-dshr-org-2470 351 30     _SP blog-dshr-org-2470 351 31 July July NNP blog-dshr-org-2470 351 32 ( ( -LRB- blog-dshr-org-2470 351 33 5 5 CD blog-dshr-org-2470 351 34 ) ) -RRB- blog-dshr-org-2470 351 35 ► ► NFP blog-dshr-org-2470 351 36     _SP blog-dshr-org-2470 351 37 June June NNP blog-dshr-org-2470 351 38 ( ( -LRB- blog-dshr-org-2470 351 39 7 7 CD blog-dshr-org-2470 351 40 ) ) -RRB- blog-dshr-org-2470 351 41 ► ► NFP blog-dshr-org-2470 351 42     _SP blog-dshr-org-2470 351 43 May May NNP blog-dshr-org-2470 351 44 ( ( -LRB- blog-dshr-org-2470 351 45 10 10 CD blog-dshr-org-2470 351 46 ) ) -RRB- blog-dshr-org-2470 351 47 ► ► NFP blog-dshr-org-2470 351 48     _SP blog-dshr-org-2470 351 49 April April NNP blog-dshr-org-2470 351 50 ( ( -LRB- blog-dshr-org-2470 351 51 8) 8) CD blog-dshr-org-2470 351 52 ► ► CD blog-dshr-org-2470 351 53     _SP blog-dshr-org-2470 351 54 March March NNP blog-dshr-org-2470 351 55 ( ( -LRB- blog-dshr-org-2470 351 56 9 9 CD blog-dshr-org-2470 351 57 ) ) -RRB- blog-dshr-org-2470 351 58 ► ► NFP blog-dshr-org-2470 351 59     _SP blog-dshr-org-2470 351 60 February February NNP blog-dshr-org-2470 351 61 ( ( -LRB- blog-dshr-org-2470 351 62 9 9 CD blog-dshr-org-2470 351 63 ) ) -RRB- blog-dshr-org-2470 351 64 ► ► NFP blog-dshr-org-2470 351 65     _SP blog-dshr-org-2470 351 66 January January NNP blog-dshr-org-2470 351 67 ( ( -LRB- blog-dshr-org-2470 351 68 10 10 CD blog-dshr-org-2470 351 69 ) ) -RRB- blog-dshr-org-2470 351 70 ► ► NFP blog-dshr-org-2470 351 71     _SP blog-dshr-org-2470 351 72 2017 2017 CD blog-dshr-org-2470 351 73 ( ( -LRB- blog-dshr-org-2470 351 74 82 82 CD blog-dshr-org-2470 351 75 ) ) -RRB- blog-dshr-org-2470 351 76 ► ► NFP blog-dshr-org-2470 351 77     _SP blog-dshr-org-2470 351 78 December December NNP blog-dshr-org-2470 351 79 ( ( -LRB- blog-dshr-org-2470 351 80 6 6 CD blog-dshr-org-2470 351 81 ) ) -RRB- blog-dshr-org-2470 351 82 ► ► NFP blog-dshr-org-2470 351 83     _SP blog-dshr-org-2470 351 84 November November NNP blog-dshr-org-2470 351 85 ( ( -LRB- blog-dshr-org-2470 351 86 6 6 CD blog-dshr-org-2470 351 87 ) ) -RRB- blog-dshr-org-2470 351 88 ► ► NFP blog-dshr-org-2470 351 89     _SP blog-dshr-org-2470 351 90 October October NNP blog-dshr-org-2470 351 91 ( ( -LRB- blog-dshr-org-2470 351 92 8) 8) CD blog-dshr-org-2470 351 93 ► ► CD blog-dshr-org-2470 351 94     _SP blog-dshr-org-2470 351 95 September September NNP blog-dshr-org-2470 351 96 ( ( -LRB- blog-dshr-org-2470 351 97 6 6 CD blog-dshr-org-2470 351 98 ) ) -RRB- blog-dshr-org-2470 351 99 ► ► NFP blog-dshr-org-2470 351 100     _SP blog-dshr-org-2470 351 101 August August NNP blog-dshr-org-2470 351 102 ( ( -LRB- blog-dshr-org-2470 351 103 7 7 CD blog-dshr-org-2470 351 104 ) ) -RRB- blog-dshr-org-2470 351 105 ► ► NFP blog-dshr-org-2470 351 106     _SP blog-dshr-org-2470 351 107 July July NNP blog-dshr-org-2470 351 108 ( ( -LRB- blog-dshr-org-2470 351 109 5 5 CD blog-dshr-org-2470 351 110 ) ) -RRB- blog-dshr-org-2470 351 111 ► ► NFP blog-dshr-org-2470 351 112     _SP blog-dshr-org-2470 351 113 June June NNP blog-dshr-org-2470 351 114 ( ( -LRB- blog-dshr-org-2470 351 115 7 7 CD blog-dshr-org-2470 351 116 ) ) -RRB- blog-dshr-org-2470 351 117 ► ► NFP blog-dshr-org-2470 351 118     _SP blog-dshr-org-2470 351 119 May May NNP blog-dshr-org-2470 351 120 ( ( -LRB- blog-dshr-org-2470 351 121 6 6 CD blog-dshr-org-2470 351 122 ) ) -RRB- blog-dshr-org-2470 351 123 ► ► NFP blog-dshr-org-2470 351 124     _SP blog-dshr-org-2470 351 125 April April NNP blog-dshr-org-2470 351 126 ( ( -LRB- blog-dshr-org-2470 351 127 7 7 CD blog-dshr-org-2470 351 128 ) ) -RRB- blog-dshr-org-2470 351 129 ► ► NFP blog-dshr-org-2470 351 130     _SP blog-dshr-org-2470 351 131 March March NNP blog-dshr-org-2470 351 132 ( ( -LRB- blog-dshr-org-2470 351 133 11 11 CD blog-dshr-org-2470 351 134 ) ) -RRB- blog-dshr-org-2470 351 135 ► ► NFP blog-dshr-org-2470 351 136     _SP blog-dshr-org-2470 351 137 February February NNP blog-dshr-org-2470 351 138 ( ( -LRB- blog-dshr-org-2470 351 139 5 5 CD blog-dshr-org-2470 351 140 ) ) -RRB- blog-dshr-org-2470 351 141 ► ► NFP blog-dshr-org-2470 351 142     _SP blog-dshr-org-2470 351 143 January January NNP blog-dshr-org-2470 351 144 ( ( -LRB- blog-dshr-org-2470 351 145 8) 8) CD blog-dshr-org-2470 351 146 ► ► CD blog-dshr-org-2470 351 147     _SP blog-dshr-org-2470 351 148 2016 2016 CD blog-dshr-org-2470 351 149 ( ( -LRB- blog-dshr-org-2470 351 150 89 89 CD blog-dshr-org-2470 351 151 ) ) -RRB- blog-dshr-org-2470 351 152 ► ► NFP blog-dshr-org-2470 351 153     _SP blog-dshr-org-2470 351 154 December December NNP blog-dshr-org-2470 351 155 ( ( -LRB- blog-dshr-org-2470 351 156 4 4 CD blog-dshr-org-2470 351 157 ) ) -RRB- blog-dshr-org-2470 351 158 ► ► NFP blog-dshr-org-2470 351 159     _SP blog-dshr-org-2470 351 160 November November NNP blog-dshr-org-2470 351 161 ( ( -LRB- blog-dshr-org-2470 351 162 8) 8) CD blog-dshr-org-2470 351 163 ► ► CD blog-dshr-org-2470 351 164     _SP blog-dshr-org-2470 351 165 October October NNP blog-dshr-org-2470 351 166 ( ( -LRB- blog-dshr-org-2470 351 167 10 10 CD blog-dshr-org-2470 351 168 ) ) -RRB- blog-dshr-org-2470 351 169 ► ► NFP blog-dshr-org-2470 351 170     _SP blog-dshr-org-2470 351 171 September September NNP blog-dshr-org-2470 351 172 ( ( -LRB- blog-dshr-org-2470 351 173 8) 8) CD blog-dshr-org-2470 351 174 ► ► CD blog-dshr-org-2470 351 175     _SP blog-dshr-org-2470 351 176 August August NNP blog-dshr-org-2470 351 177 ( ( -LRB- blog-dshr-org-2470 351 178 8) 8) CD blog-dshr-org-2470 351 179 ► ► CD blog-dshr-org-2470 351 180     _SP blog-dshr-org-2470 351 181 July July NNP blog-dshr-org-2470 351 182 ( ( -LRB- blog-dshr-org-2470 351 183 7 7 CD blog-dshr-org-2470 351 184 ) ) -RRB- blog-dshr-org-2470 351 185 ► ► NFP blog-dshr-org-2470 351 186     _SP blog-dshr-org-2470 351 187 June June NNP blog-dshr-org-2470 351 188 ( ( -LRB- blog-dshr-org-2470 351 189 8) 8) CD blog-dshr-org-2470 351 190 ► ► CD blog-dshr-org-2470 351 191     _SP blog-dshr-org-2470 351 192 May May NNP blog-dshr-org-2470 351 193 ( ( -LRB- blog-dshr-org-2470 351 194 7 7 CD blog-dshr-org-2470 351 195 ) ) -RRB- blog-dshr-org-2470 351 196 ► ► NFP blog-dshr-org-2470 351 197     _SP blog-dshr-org-2470 351 198 April April NNP blog-dshr-org-2470 351 199 ( ( -LRB- blog-dshr-org-2470 351 200 5 5 CD blog-dshr-org-2470 351 201 ) ) -RRB- blog-dshr-org-2470 351 202 ► ► NFP blog-dshr-org-2470 351 203     _SP blog-dshr-org-2470 351 204 March March NNP blog-dshr-org-2470 351 205 ( ( -LRB- blog-dshr-org-2470 351 206 10 10 CD blog-dshr-org-2470 351 207 ) ) -RRB- blog-dshr-org-2470 351 208 ► ► NFP blog-dshr-org-2470 351 209     _SP blog-dshr-org-2470 351 210 February February NNP blog-dshr-org-2470 351 211 ( ( -LRB- blog-dshr-org-2470 351 212 7 7 CD blog-dshr-org-2470 351 213 ) ) -RRB- blog-dshr-org-2470 351 214 ► ► NFP blog-dshr-org-2470 351 215     _SP blog-dshr-org-2470 351 216 January January NNP blog-dshr-org-2470 351 217 ( ( -LRB- blog-dshr-org-2470 351 218 7 7 CD blog-dshr-org-2470 351 219 ) ) -RRB- blog-dshr-org-2470 351 220 ► ► NFP blog-dshr-org-2470 351 221     _SP blog-dshr-org-2470 351 222 2015 2015 CD blog-dshr-org-2470 351 223 ( ( -LRB- blog-dshr-org-2470 351 224 75 75 CD blog-dshr-org-2470 351 225 ) ) -RRB- blog-dshr-org-2470 351 226 ► ► NFP blog-dshr-org-2470 351 227     _SP blog-dshr-org-2470 351 228 December December NNP blog-dshr-org-2470 351 229 ( ( -LRB- blog-dshr-org-2470 351 230 7 7 CD blog-dshr-org-2470 351 231 ) ) -RRB- blog-dshr-org-2470 351 232 ► ► NFP blog-dshr-org-2470 351 233     _SP blog-dshr-org-2470 351 234 November November NNP blog-dshr-org-2470 351 235 ( ( -LRB- blog-dshr-org-2470 351 236 5 5 CD blog-dshr-org-2470 351 237 ) ) -RRB- blog-dshr-org-2470 351 238 ► ► NFP blog-dshr-org-2470 351 239     _SP blog-dshr-org-2470 351 240 October October NNP blog-dshr-org-2470 351 241 ( ( -LRB- blog-dshr-org-2470 351 242 11 11 CD blog-dshr-org-2470 351 243 ) ) -RRB- blog-dshr-org-2470 351 244 ► ► NFP blog-dshr-org-2470 351 245     _SP blog-dshr-org-2470 351 246 September September NNP blog-dshr-org-2470 351 247 ( ( -LRB- blog-dshr-org-2470 351 248 5 5 CD blog-dshr-org-2470 351 249 ) ) -RRB- blog-dshr-org-2470 351 250 ► ► NFP blog-dshr-org-2470 351 251     _SP blog-dshr-org-2470 351 252 August August NNP blog-dshr-org-2470 351 253 ( ( -LRB- blog-dshr-org-2470 351 254 3 3 CD blog-dshr-org-2470 351 255 ) ) -RRB- blog-dshr-org-2470 351 256 ► ► NFP blog-dshr-org-2470 351 257     _SP blog-dshr-org-2470 351 258 July July NNP blog-dshr-org-2470 351 259 ( ( -LRB- blog-dshr-org-2470 351 260 3 3 CD blog-dshr-org-2470 351 261 ) ) -RRB- blog-dshr-org-2470 351 262 ► ► NFP blog-dshr-org-2470 351 263     _SP blog-dshr-org-2470 351 264 June June NNP blog-dshr-org-2470 351 265 ( ( -LRB- blog-dshr-org-2470 351 266 8) 8) CD blog-dshr-org-2470 351 267 ► ► CD blog-dshr-org-2470 351 268     _SP blog-dshr-org-2470 351 269 May May NNP blog-dshr-org-2470 351 270 ( ( -LRB- blog-dshr-org-2470 351 271 10 10 CD blog-dshr-org-2470 351 272 ) ) -RRB- blog-dshr-org-2470 351 273 ► ► NFP blog-dshr-org-2470 351 274     _SP blog-dshr-org-2470 351 275 April April NNP blog-dshr-org-2470 351 276 ( ( -LRB- blog-dshr-org-2470 351 277 6 6 CD blog-dshr-org-2470 351 278 ) ) -RRB- blog-dshr-org-2470 351 279 ► ► NFP blog-dshr-org-2470 351 280     _SP blog-dshr-org-2470 351 281 March March NNP blog-dshr-org-2470 351 282 ( ( -LRB- blog-dshr-org-2470 351 283 6 6 CD blog-dshr-org-2470 351 284 ) ) -RRB- blog-dshr-org-2470 351 285 ► ► NFP blog-dshr-org-2470 351 286     _SP blog-dshr-org-2470 351 287 February February NNP blog-dshr-org-2470 351 288 ( ( -LRB- blog-dshr-org-2470 351 289 7 7 CD blog-dshr-org-2470 351 290 ) ) -RRB- blog-dshr-org-2470 351 291 ► ► NFP blog-dshr-org-2470 351 292     _SP blog-dshr-org-2470 351 293 January January NNP blog-dshr-org-2470 351 294 ( ( -LRB- blog-dshr-org-2470 351 295 4 4 CD blog-dshr-org-2470 351 296 ) ) -RRB- blog-dshr-org-2470 351 297 ► ► CD blog-dshr-org-2470 351 298     _SP blog-dshr-org-2470 351 299 2014 2014 CD blog-dshr-org-2470 351 300 ( ( -LRB- blog-dshr-org-2470 351 301 68 68 CD blog-dshr-org-2470 351 302 ) ) -RRB- blog-dshr-org-2470 351 303 ► ► NFP blog-dshr-org-2470 351 304     _SP blog-dshr-org-2470 351 305 December December NNP blog-dshr-org-2470 351 306 ( ( -LRB- blog-dshr-org-2470 351 307 7 7 CD blog-dshr-org-2470 351 308 ) ) -RRB- blog-dshr-org-2470 351 309 ► ► NFP blog-dshr-org-2470 351 310     _SP blog-dshr-org-2470 351 311 November November NNP blog-dshr-org-2470 351 312 ( ( -LRB- blog-dshr-org-2470 351 313 8) 8) CD blog-dshr-org-2470 351 314 ► ► CD blog-dshr-org-2470 351 315     _SP blog-dshr-org-2470 351 316 October October NNP blog-dshr-org-2470 351 317 ( ( -LRB- blog-dshr-org-2470 351 318 6 6 CD blog-dshr-org-2470 351 319 ) ) -RRB- blog-dshr-org-2470 351 320 ► ► NFP blog-dshr-org-2470 351 321     _SP blog-dshr-org-2470 351 322 September September NNP blog-dshr-org-2470 351 323 ( ( -LRB- blog-dshr-org-2470 351 324 8) 8) CD blog-dshr-org-2470 351 325 ► ► CD blog-dshr-org-2470 351 326     _SP blog-dshr-org-2470 351 327 August August NNP blog-dshr-org-2470 351 328 ( ( -LRB- blog-dshr-org-2470 351 329 7 7 CD blog-dshr-org-2470 351 330 ) ) -RRB- blog-dshr-org-2470 351 331 ► ► NFP blog-dshr-org-2470 351 332     _SP blog-dshr-org-2470 351 333 July July NNP blog-dshr-org-2470 351 334 ( ( -LRB- blog-dshr-org-2470 351 335 3 3 CD blog-dshr-org-2470 351 336 ) ) -RRB- blog-dshr-org-2470 351 337 ► ► NFP blog-dshr-org-2470 351 338     _SP blog-dshr-org-2470 351 339 June June NNP blog-dshr-org-2470 351 340 ( ( -LRB- blog-dshr-org-2470 351 341 5 5 CD blog-dshr-org-2470 351 342 ) ) -RRB- blog-dshr-org-2470 351 343 ► ► NFP blog-dshr-org-2470 351 344     _SP blog-dshr-org-2470 351 345 May May NNP blog-dshr-org-2470 351 346 ( ( -LRB- blog-dshr-org-2470 351 347 6 6 CD blog-dshr-org-2470 351 348 ) ) -RRB- blog-dshr-org-2470 351 349 ► ► NFP blog-dshr-org-2470 351 350     _SP blog-dshr-org-2470 351 351 April April NNP blog-dshr-org-2470 351 352 ( ( -LRB- blog-dshr-org-2470 351 353 5 5 CD blog-dshr-org-2470 351 354 ) ) -RRB- blog-dshr-org-2470 351 355 ► ► NFP blog-dshr-org-2470 351 356     _SP blog-dshr-org-2470 351 357 March March NNP blog-dshr-org-2470 351 358 ( ( -LRB- blog-dshr-org-2470 351 359 6 6 CD blog-dshr-org-2470 351 360 ) ) -RRB- blog-dshr-org-2470 351 361 ► ► NFP blog-dshr-org-2470 351 362     _SP blog-dshr-org-2470 351 363 February February NNP blog-dshr-org-2470 351 364 ( ( -LRB- blog-dshr-org-2470 351 365 2 2 CD blog-dshr-org-2470 351 366 ) ) -RRB- blog-dshr-org-2470 351 367 ► ► NFP blog-dshr-org-2470 351 368     _SP blog-dshr-org-2470 351 369 January January NNP blog-dshr-org-2470 351 370 ( ( -LRB- blog-dshr-org-2470 351 371 5 5 CD blog-dshr-org-2470 351 372 ) ) -RRB- blog-dshr-org-2470 351 373 ► ► CD blog-dshr-org-2470 351 374     _SP blog-dshr-org-2470 351 375 2013 2013 CD blog-dshr-org-2470 351 376 ( ( -LRB- blog-dshr-org-2470 351 377 67 67 CD blog-dshr-org-2470 351 378 ) ) -RRB- blog-dshr-org-2470 351 379 ► ► NFP blog-dshr-org-2470 351 380     _SP blog-dshr-org-2470 351 381 December December NNP blog-dshr-org-2470 351 382 ( ( -LRB- blog-dshr-org-2470 351 383 3 3 CD blog-dshr-org-2470 351 384 ) ) -RRB- blog-dshr-org-2470 351 385 ► ► NFP blog-dshr-org-2470 351 386     _SP blog-dshr-org-2470 351 387 November November NNP blog-dshr-org-2470 351 388 ( ( -LRB- blog-dshr-org-2470 351 389 6 6 CD blog-dshr-org-2470 351 390 ) ) -RRB- blog-dshr-org-2470 351 391 ► ► NFP blog-dshr-org-2470 351 392     _SP blog-dshr-org-2470 351 393 October October NNP blog-dshr-org-2470 351 394 ( ( -LRB- blog-dshr-org-2470 351 395 7 7 CD blog-dshr-org-2470 351 396 ) ) -RRB- blog-dshr-org-2470 351 397 ► ► NFP blog-dshr-org-2470 351 398     _SP blog-dshr-org-2470 351 399 September September NNP blog-dshr-org-2470 351 400 ( ( -LRB- blog-dshr-org-2470 351 401 6 6 CD blog-dshr-org-2470 351 402 ) ) -RRB- blog-dshr-org-2470 351 403 ► ► NFP blog-dshr-org-2470 351 404     _SP blog-dshr-org-2470 351 405 August August NNP blog-dshr-org-2470 351 406 ( ( -LRB- blog-dshr-org-2470 351 407 3 3 CD blog-dshr-org-2470 351 408 ) ) -RRB- blog-dshr-org-2470 351 409 ► ► NFP blog-dshr-org-2470 351 410     _SP blog-dshr-org-2470 351 411 July July NNP blog-dshr-org-2470 351 412 ( ( -LRB- blog-dshr-org-2470 351 413 5 5 CD blog-dshr-org-2470 351 414 ) ) -RRB- blog-dshr-org-2470 351 415 ► ► NFP blog-dshr-org-2470 351 416     _SP blog-dshr-org-2470 351 417 June June NNP blog-dshr-org-2470 351 418 ( ( -LRB- blog-dshr-org-2470 351 419 6 6 CD blog-dshr-org-2470 351 420 ) ) -RRB- blog-dshr-org-2470 351 421 ► ► NFP blog-dshr-org-2470 351 422     _SP blog-dshr-org-2470 351 423 May May NNP blog-dshr-org-2470 351 424 ( ( -LRB- blog-dshr-org-2470 351 425 5 5 CD blog-dshr-org-2470 351 426 ) ) -RRB- blog-dshr-org-2470 351 427 ► ► NFP blog-dshr-org-2470 351 428     _SP blog-dshr-org-2470 351 429 April April NNP blog-dshr-org-2470 351 430 ( ( -LRB- blog-dshr-org-2470 351 431 9 9 CD blog-dshr-org-2470 351 432 ) ) -RRB- blog-dshr-org-2470 351 433 ► ► NFP blog-dshr-org-2470 351 434     _SP blog-dshr-org-2470 351 435 March March NNP blog-dshr-org-2470 351 436 ( ( -LRB- blog-dshr-org-2470 351 437 5 5 CD blog-dshr-org-2470 351 438 ) ) -RRB- blog-dshr-org-2470 351 439 ► ► NFP blog-dshr-org-2470 351 440     _SP blog-dshr-org-2470 351 441 February February NNP blog-dshr-org-2470 351 442 ( ( -LRB- blog-dshr-org-2470 351 443 5 5 CD blog-dshr-org-2470 351 444 ) ) -RRB- blog-dshr-org-2470 351 445 ► ► NFP blog-dshr-org-2470 351 446     _SP blog-dshr-org-2470 351 447 January January NNP blog-dshr-org-2470 351 448 ( ( -LRB- blog-dshr-org-2470 351 449 7 7 CD blog-dshr-org-2470 351 450 ) ) -RRB- blog-dshr-org-2470 351 451 ► ► CD blog-dshr-org-2470 351 452     _SP blog-dshr-org-2470 351 453 2012 2012 CD blog-dshr-org-2470 351 454 ( ( -LRB- blog-dshr-org-2470 351 455 43 43 CD blog-dshr-org-2470 351 456 ) ) -RRB- blog-dshr-org-2470 351 457 ► ► NFP blog-dshr-org-2470 351 458     _SP blog-dshr-org-2470 351 459 December December NNP blog-dshr-org-2470 351 460 ( ( -LRB- blog-dshr-org-2470 351 461 4 4 CD blog-dshr-org-2470 351 462 ) ) -RRB- blog-dshr-org-2470 351 463 ► ► NFP blog-dshr-org-2470 351 464     _SP blog-dshr-org-2470 351 465 November November NNP blog-dshr-org-2470 351 466 ( ( -LRB- blog-dshr-org-2470 351 467 4 4 CD blog-dshr-org-2470 351 468 ) ) -RRB- blog-dshr-org-2470 351 469 ► ► NFP blog-dshr-org-2470 351 470     _SP blog-dshr-org-2470 351 471 October October NNP blog-dshr-org-2470 351 472 ( ( -LRB- blog-dshr-org-2470 351 473 6 6 CD blog-dshr-org-2470 351 474 ) ) -RRB- blog-dshr-org-2470 351 475 ► ► NFP blog-dshr-org-2470 351 476     _SP blog-dshr-org-2470 351 477 September September NNP blog-dshr-org-2470 351 478 ( ( -LRB- blog-dshr-org-2470 351 479 6 6 CD blog-dshr-org-2470 351 480 ) ) -RRB- blog-dshr-org-2470 351 481 ► ► NFP blog-dshr-org-2470 351 482     _SP blog-dshr-org-2470 351 483 August August NNP blog-dshr-org-2470 351 484 ( ( -LRB- blog-dshr-org-2470 351 485 2 2 CD blog-dshr-org-2470 351 486 ) ) -RRB- blog-dshr-org-2470 351 487 ► ► NFP blog-dshr-org-2470 351 488     _SP blog-dshr-org-2470 351 489 July July NNP blog-dshr-org-2470 351 490 ( ( -LRB- blog-dshr-org-2470 351 491 5 5 CD blog-dshr-org-2470 351 492 ) ) -RRB- blog-dshr-org-2470 351 493 ► ► NFP blog-dshr-org-2470 351 494     _SP blog-dshr-org-2470 351 495 June June NNP blog-dshr-org-2470 351 496 ( ( -LRB- blog-dshr-org-2470 351 497 2 2 CD blog-dshr-org-2470 351 498 ) ) -RRB- blog-dshr-org-2470 351 499 ► ► NFP blog-dshr-org-2470 351 500     _SP blog-dshr-org-2470 351 501 May May NNP blog-dshr-org-2470 351 502 ( ( -LRB- blog-dshr-org-2470 351 503 5 5 CD blog-dshr-org-2470 351 504 ) ) -RRB- blog-dshr-org-2470 351 505 ► ► NFP blog-dshr-org-2470 351 506     _SP blog-dshr-org-2470 351 507 March March NNP blog-dshr-org-2470 351 508 ( ( -LRB- blog-dshr-org-2470 351 509 1 1 CD blog-dshr-org-2470 351 510 ) ) -RRB- blog-dshr-org-2470 351 511 ► ► NFP blog-dshr-org-2470 351 512     _SP blog-dshr-org-2470 351 513 February February NNP blog-dshr-org-2470 351 514 ( ( -LRB- blog-dshr-org-2470 351 515 5 5 CD blog-dshr-org-2470 351 516 ) ) -RRB- blog-dshr-org-2470 351 517 ► ► NFP blog-dshr-org-2470 351 518     _SP blog-dshr-org-2470 351 519 January January NNP blog-dshr-org-2470 351 520 ( ( -LRB- blog-dshr-org-2470 351 521 3 3 CD blog-dshr-org-2470 351 522 ) ) -RRB- blog-dshr-org-2470 351 523 ► ► CD blog-dshr-org-2470 351 524     _SP blog-dshr-org-2470 351 525 2011 2011 CD blog-dshr-org-2470 351 526 ( ( -LRB- blog-dshr-org-2470 351 527 40 40 CD blog-dshr-org-2470 351 528 ) ) -RRB- blog-dshr-org-2470 351 529 ► ► NFP blog-dshr-org-2470 351 530     _SP blog-dshr-org-2470 351 531 December December NNP blog-dshr-org-2470 351 532 ( ( -LRB- blog-dshr-org-2470 351 533 2 2 CD blog-dshr-org-2470 351 534 ) ) -RRB- blog-dshr-org-2470 351 535 ► ► NFP blog-dshr-org-2470 351 536     _SP blog-dshr-org-2470 351 537 November November NNP blog-dshr-org-2470 351 538 ( ( -LRB- blog-dshr-org-2470 351 539 1 1 CD blog-dshr-org-2470 351 540 ) ) -RRB- blog-dshr-org-2470 351 541 ► ► NFP blog-dshr-org-2470 351 542     _SP blog-dshr-org-2470 351 543 October October NNP blog-dshr-org-2470 351 544 ( ( -LRB- blog-dshr-org-2470 351 545 7 7 CD blog-dshr-org-2470 351 546 ) ) -RRB- blog-dshr-org-2470 351 547 ► ► NFP blog-dshr-org-2470 351 548     _SP blog-dshr-org-2470 351 549 September September NNP blog-dshr-org-2470 351 550 ( ( -LRB- blog-dshr-org-2470 351 551 3 3 CD blog-dshr-org-2470 351 552 ) ) -RRB- blog-dshr-org-2470 351 553 ► ► NFP blog-dshr-org-2470 351 554     _SP blog-dshr-org-2470 351 555 August August NNP blog-dshr-org-2470 351 556 ( ( -LRB- blog-dshr-org-2470 351 557 5 5 CD blog-dshr-org-2470 351 558 ) ) -RRB- blog-dshr-org-2470 351 559 ► ► NFP blog-dshr-org-2470 351 560     _SP blog-dshr-org-2470 351 561 July July NNP blog-dshr-org-2470 351 562 ( ( -LRB- blog-dshr-org-2470 351 563 2 2 CD blog-dshr-org-2470 351 564 ) ) -RRB- blog-dshr-org-2470 351 565 ► ► NFP blog-dshr-org-2470 351 566     _SP blog-dshr-org-2470 351 567 June June NNP blog-dshr-org-2470 351 568 ( ( -LRB- blog-dshr-org-2470 351 569 2 2 CD blog-dshr-org-2470 351 570 ) ) -RRB- blog-dshr-org-2470 351 571 ► ► NFP blog-dshr-org-2470 351 572     _SP blog-dshr-org-2470 351 573 May May NNP blog-dshr-org-2470 351 574 ( ( -LRB- blog-dshr-org-2470 351 575 2 2 CD blog-dshr-org-2470 351 576 ) ) -RRB- blog-dshr-org-2470 351 577 ► ► NFP blog-dshr-org-2470 351 578     _SP blog-dshr-org-2470 351 579 April April NNP blog-dshr-org-2470 351 580 ( ( -LRB- blog-dshr-org-2470 351 581 4 4 CD blog-dshr-org-2470 351 582 ) ) -RRB- blog-dshr-org-2470 351 583 ► ► NFP blog-dshr-org-2470 351 584     _SP blog-dshr-org-2470 351 585 March March NNP blog-dshr-org-2470 351 586 ( ( -LRB- blog-dshr-org-2470 351 587 4 4 CD blog-dshr-org-2470 351 588 ) ) -RRB- blog-dshr-org-2470 351 589 ► ► NFP blog-dshr-org-2470 351 590     _SP blog-dshr-org-2470 351 591 February February NNP blog-dshr-org-2470 351 592 ( ( -LRB- blog-dshr-org-2470 351 593 4 4 CD blog-dshr-org-2470 351 594 ) ) -RRB- blog-dshr-org-2470 351 595 ► ► NFP blog-dshr-org-2470 351 596     _SP blog-dshr-org-2470 351 597 January January NNP blog-dshr-org-2470 351 598 ( ( -LRB- blog-dshr-org-2470 351 599 4 4 CD blog-dshr-org-2470 351 600 ) ) -RRB- blog-dshr-org-2470 351 601 ► ► CD blog-dshr-org-2470 351 602     _SP blog-dshr-org-2470 351 603 2010 2010 CD blog-dshr-org-2470 351 604 ( ( -LRB- blog-dshr-org-2470 351 605 17 17 CD blog-dshr-org-2470 351 606 ) ) -RRB- blog-dshr-org-2470 351 607 ► ► NFP blog-dshr-org-2470 351 608     _SP blog-dshr-org-2470 351 609 December December NNP blog-dshr-org-2470 351 610 ( ( -LRB- blog-dshr-org-2470 351 611 5 5 CD blog-dshr-org-2470 351 612 ) ) -RRB- blog-dshr-org-2470 351 613 ► ► NFP blog-dshr-org-2470 351 614     _SP blog-dshr-org-2470 351 615 November November NNP blog-dshr-org-2470 351 616 ( ( -LRB- blog-dshr-org-2470 351 617 3 3 CD blog-dshr-org-2470 351 618 ) ) -RRB- blog-dshr-org-2470 351 619 ► ► NFP blog-dshr-org-2470 351 620     _SP blog-dshr-org-2470 351 621 October October NNP blog-dshr-org-2470 351 622 ( ( -LRB- blog-dshr-org-2470 351 623 4 4 CD blog-dshr-org-2470 351 624 ) ) -RRB- blog-dshr-org-2470 351 625 ► ► NFP blog-dshr-org-2470 351 626     _SP blog-dshr-org-2470 351 627 September September NNP blog-dshr-org-2470 351 628 ( ( -LRB- blog-dshr-org-2470 351 629 2 2 CD blog-dshr-org-2470 351 630 ) ) -RRB- blog-dshr-org-2470 351 631 ► ► NFP blog-dshr-org-2470 351 632     _SP blog-dshr-org-2470 351 633 July July NNP blog-dshr-org-2470 351 634 ( ( -LRB- blog-dshr-org-2470 351 635 1 1 CD blog-dshr-org-2470 351 636 ) ) -RRB- blog-dshr-org-2470 351 637 ► ► NFP blog-dshr-org-2470 351 638     _SP blog-dshr-org-2470 351 639 June June NNP blog-dshr-org-2470 351 640 ( ( -LRB- blog-dshr-org-2470 351 641 1 1 CD blog-dshr-org-2470 351 642 ) ) -RRB- blog-dshr-org-2470 351 643 ► ► NFP blog-dshr-org-2470 351 644     _SP blog-dshr-org-2470 351 645 February February NNP blog-dshr-org-2470 351 646 ( ( -LRB- blog-dshr-org-2470 351 647 1 1 CD blog-dshr-org-2470 351 648 ) ) -RRB- blog-dshr-org-2470 351 649 ► ► NFP blog-dshr-org-2470 351 650     _SP blog-dshr-org-2470 351 651 2009 2009 CD blog-dshr-org-2470 351 652 ( ( -LRB- blog-dshr-org-2470 351 653 8) 8) CD blog-dshr-org-2470 351 654 ► ► CD blog-dshr-org-2470 351 655     _SP blog-dshr-org-2470 351 656 July July NNP blog-dshr-org-2470 351 657 ( ( -LRB- blog-dshr-org-2470 351 658 1 1 CD blog-dshr-org-2470 351 659 ) ) -RRB- blog-dshr-org-2470 351 660 ► ► NFP blog-dshr-org-2470 351 661     _SP blog-dshr-org-2470 351 662 June June NNP blog-dshr-org-2470 351 663 ( ( -LRB- blog-dshr-org-2470 351 664 1 1 CD blog-dshr-org-2470 351 665 ) ) -RRB- blog-dshr-org-2470 351 666 ► ► NFP blog-dshr-org-2470 351 667     _SP blog-dshr-org-2470 351 668 May May NNP blog-dshr-org-2470 351 669 ( ( -LRB- blog-dshr-org-2470 351 670 1 1 CD blog-dshr-org-2470 351 671 ) ) -RRB- blog-dshr-org-2470 351 672 ► ► NFP blog-dshr-org-2470 351 673     _SP blog-dshr-org-2470 351 674 April April NNP blog-dshr-org-2470 351 675 ( ( -LRB- blog-dshr-org-2470 351 676 1 1 CD blog-dshr-org-2470 351 677 ) ) -RRB- blog-dshr-org-2470 351 678 ► ► NFP blog-dshr-org-2470 351 679     _SP blog-dshr-org-2470 351 680 March March NNP blog-dshr-org-2470 351 681 ( ( -LRB- blog-dshr-org-2470 351 682 2 2 CD blog-dshr-org-2470 351 683 ) ) -RRB- blog-dshr-org-2470 351 684 ► ► NFP blog-dshr-org-2470 351 685     _SP blog-dshr-org-2470 351 686 January January NNP blog-dshr-org-2470 351 687 ( ( -LRB- blog-dshr-org-2470 351 688 2 2 CD blog-dshr-org-2470 351 689 ) ) -RRB- blog-dshr-org-2470 351 690 ► ► NFP blog-dshr-org-2470 351 691     _SP blog-dshr-org-2470 351 692 2008 2008 CD blog-dshr-org-2470 351 693 ( ( -LRB- blog-dshr-org-2470 351 694 8) 8) CD blog-dshr-org-2470 351 695 ► ► CD blog-dshr-org-2470 351 696     _SP blog-dshr-org-2470 351 697 December December NNP blog-dshr-org-2470 351 698 ( ( -LRB- blog-dshr-org-2470 351 699 2 2 CD blog-dshr-org-2470 351 700 ) ) -RRB- blog-dshr-org-2470 351 701 ► ► NFP blog-dshr-org-2470 351 702     _SP blog-dshr-org-2470 351 703 March March NNP blog-dshr-org-2470 351 704 ( ( -LRB- blog-dshr-org-2470 351 705 1 1 CD blog-dshr-org-2470 351 706 ) ) -RRB- blog-dshr-org-2470 351 707 ► ► NFP blog-dshr-org-2470 351 708     _SP blog-dshr-org-2470 351 709 January January NNP blog-dshr-org-2470 351 710 ( ( -LRB- blog-dshr-org-2470 351 711 5 5 CD blog-dshr-org-2470 351 712 ) ) -RRB- blog-dshr-org-2470 351 713 ► ► CD blog-dshr-org-2470 351 714     _SP blog-dshr-org-2470 351 715 2007 2007 CD blog-dshr-org-2470 351 716 ( ( -LRB- blog-dshr-org-2470 351 717 14 14 CD blog-dshr-org-2470 351 718 ) ) -RRB- blog-dshr-org-2470 351 719 ► ► NFP blog-dshr-org-2470 351 720     _SP blog-dshr-org-2470 351 721 December December NNP blog-dshr-org-2470 351 722 ( ( -LRB- blog-dshr-org-2470 351 723 1 1 CD blog-dshr-org-2470 351 724 ) ) -RRB- blog-dshr-org-2470 351 725 ► ► NFP blog-dshr-org-2470 351 726     _SP blog-dshr-org-2470 351 727 October October NNP blog-dshr-org-2470 351 728 ( ( -LRB- blog-dshr-org-2470 351 729 3 3 CD blog-dshr-org-2470 351 730 ) ) -RRB- blog-dshr-org-2470 351 731 ► ► NFP blog-dshr-org-2470 351 732     _SP blog-dshr-org-2470 351 733 September September NNP blog-dshr-org-2470 351 734 ( ( -LRB- blog-dshr-org-2470 351 735 1 1 CD blog-dshr-org-2470 351 736 ) ) -RRB- blog-dshr-org-2470 351 737 ► ► NFP blog-dshr-org-2470 351 738     _SP blog-dshr-org-2470 351 739 August August NNP blog-dshr-org-2470 351 740 ( ( -LRB- blog-dshr-org-2470 351 741 1 1 CD blog-dshr-org-2470 351 742 ) ) -RRB- blog-dshr-org-2470 351 743 ► ► NFP blog-dshr-org-2470 351 744     _SP blog-dshr-org-2470 351 745 July July NNP blog-dshr-org-2470 351 746 ( ( -LRB- blog-dshr-org-2470 351 747 2 2 CD blog-dshr-org-2470 351 748 ) ) -RRB- blog-dshr-org-2470 351 749 ► ► NFP blog-dshr-org-2470 351 750     _SP blog-dshr-org-2470 351 751 June June NNP blog-dshr-org-2470 351 752 ( ( -LRB- blog-dshr-org-2470 351 753 3 3 CD blog-dshr-org-2470 351 754 ) ) -RRB- blog-dshr-org-2470 351 755 ► ► NFP blog-dshr-org-2470 351 756     _SP blog-dshr-org-2470 351 757 May May NNP blog-dshr-org-2470 351 758 ( ( -LRB- blog-dshr-org-2470 351 759 1 1 CD blog-dshr-org-2470 351 760 ) ) -RRB- blog-dshr-org-2470 351 761 ► ► NFP blog-dshr-org-2470 351 762     _SP blog-dshr-org-2470 351 763 April April NNP blog-dshr-org-2470 351 764 ( ( -LRB- blog-dshr-org-2470 351 765 2 2 LS blog-dshr-org-2470 351 766 ) ) -RRB- blog-dshr-org-2470 351 767 LOCKSS LOCKSS NNP blog-dshr-org-2470 351 768 system system NN blog-dshr-org-2470 351 769 has have VBZ blog-dshr-org-2470 351 770 permission permission NN blog-dshr-org-2470 351 771 to to TO blog-dshr-org-2470 351 772 collect collect VB blog-dshr-org-2470 351 773 , , , blog-dshr-org-2470 351 774 preserve preserve VB blog-dshr-org-2470 351 775 , , , blog-dshr-org-2470 351 776 and and CC blog-dshr-org-2470 351 777 serve serve VB blog-dshr-org-2470 351 778 this this DT blog-dshr-org-2470 351 779 Archival Archival NNP blog-dshr-org-2470 351 780 Unit Unit NNP blog-dshr-org-2470 351 781 . . . blog-dshr-org-2470 352 1 Simple simple JJ blog-dshr-org-2470 352 2 theme theme NN blog-dshr-org-2470 352 3 . . . blog-dshr-org-2470 353 1 Powered power VBN blog-dshr-org-2470 353 2 by by IN blog-dshr-org-2470 353 3 Blogger Blogger NNP blog-dshr-org-2470 353 4 . . .