- Woman documents how airport staff broke her wheelchair 3 Years Ago
- Funeral home allegedly posted photos of woman’s dead body on social media Today 1:56 PM
- Alinity Divine is being investigated after throwing her cat during stream Today 12:04 PM
- ‘Comedians In Cars Getting Coffee’ returns with Seinfeld making a racist joke about China Today 10:26 AM
- YouTubers Eugenia Cooney and Shane Dawson make a joint comeback Today 9:06 AM
- The crushing effects of Trump’s abortion ‘gag rule’ on healthcare Today 8:00 AM
- How to live stream Pacquiao vs. Thurman Today 6:20 AM
- Review: Hulu with Live TV ensures you always have something to watch Today 6:00 AM
- How to live stream UFC on ESPN 4: Rafael dos Anjos vs. Leon Edwards Today 5:49 AM
- 2020 Democrats refuse to answer our questions about ‘Cats’ Friday 4:14 PM
- Belle Delphine’s Instagram account removed after mass reporting campaign Friday 4:08 PM
- Mariah Carey refuses old-age FaceApp challenge Friday 3:19 PM
- Journalists horrified by consolidation of Gatehouse, Gannett Friday 3:12 PM
- Facebook and Google could be tracking you on porn sites Friday 1:42 PM
- 7 best sites for psychic love readings Friday 1:20 PM
When it comes to the tool that Yahoo used to scan its customers’ emails on behalf of U.S. intelligence, we have more questions than answers, at this point.
A growing pile of anonymous—and, therefore, unaccountable—sources has provided media with vague and conflicting stories about what the scanning tool actually did, what content was being scanned and for how long, under what authority, and how it was ultimately discovered.
The whole saga has left experts frustrated as they try to sort out fact from fiction.
The latest twist is a Motherboard report, which, citing two sources (at least one of whom once worked at Yahoo), says previous descriptions of the hacking tool is wrong, that the tool is actually much more powerful than other sources described. Motherboard writes:
The tool was actually more like a “rootkit,” a powerful type of malware that lives deep inside an infected system and gives hackers essentially unfettered access.
The Yahoo security team was reportedly kept in the dark for much of the time the scanning took place, resulting in the contentious June 2015 departure of Chief Information Security Officer Alex Stamos, who now works at Facebook.
It’s unclear how closely ex-Yahoo anonymous sources would have been able to examine the software, what the process looked like, or what the immediate reaction of the team and leadership was.
Patrick Howell O'Neill is a notable cybersecurity reporter whose work has focused on the dark net, national security, and law enforcement. A former senior writer at the Daily Dot, O'Neill joined CyberScoop in October 2016. I am a cybersecurity journalist at CyberScoop. I cover the security industry, national security and law enforcement.