{"id":15775,"date":"2015-12-18T10:24:29","date_gmt":"2015-12-18T16:24:29","guid":{"rendered":"http:\/\/bucktownbell.com\/?p=15775"},"modified":"2015-12-18T10:24:29","modified_gmt":"2015-12-18T16:24:29","slug":"unauthorized-code-in-juniper-firewalls-decrypts-encrypted-vpn-traffic","status":"publish","type":"post","link":"http:\/\/bucktownbell.com\/?p=15775","title":{"rendered":"\u201cUnauthorized code\u201d in Juniper firewalls decrypts encrypted VPN traffic"},"content":{"rendered":"<blockquote><p>As involved as that process was, getting unauthorized code covertly installed into an official operating system and keeping it there for years would appear to be an even more complicated\u2014and brazen\u2014undertaking. This <a href=\"http:\/\/www.spiegel.de\/international\/world\/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html\">2013 article<\/a> published by <em>Der Spiegel<\/em> reported that an NSA operation known as FEEDTHROUGH worked against Juniper firewalls and gave the agency persistent backdoor access.<\/p><\/blockquote>\n<p>Source: <em><a href=\"http:\/\/arstechnica.com\/security\/2015\/12\/unauthorized-code-in-juniper-firewalls-decrypts-encrypted-vpn-traffic\/\">\u201cUnauthorized code\u201d in Juniper firewalls decrypts encrypted VPN traffic | Ars Technica<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As involved as that process was, getting unauthorized code covertly installed into an official operating system and keeping it there for years would appear to be an even more complicated\u2014and brazen\u2014undertaking. This 2013 article published by Der Spiegel reported that &hellip; <a href=\"http:\/\/bucktownbell.com\/?p=15775\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[35],"tags":[1125,870,698,257],"class_list":["post-15775","post","type-post","status-publish","format-standard","hentry","category-operating-systems","tag-exploit-vector","tag-juniper","tag-security-research","tag-vpn"],"_links":{"self":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/15775","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=15775"}],"version-history":[{"count":1,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/15775\/revisions"}],"predecessor-version":[{"id":15776,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/15775\/revisions\/15776"}],"wp:attachment":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=15775"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=15775"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=15775"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}