0% found this document useful (0 votes)
80 views6 pages

Midpoint TLC Optimization W Google Exploitation

The document discusses top secret collection optimization efforts for an SSO team. It mentions defeating fingerprints for Google services including AdWords, Bigtable, Blogger JS, and Teragoogle. It also references new collection protocols under the code name "Serendipity".

Uploaded by

Research Guy
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
80 views6 pages

Midpoint TLC Optimization W Google Exploitation

The document discusses top secret collection optimization efforts for an SSO team. It mentions defeating fingerprints for Google services including AdWords, Bigtable, Blogger JS, and Teragoogle. It also references new collection protocols under the code name "Serendipity".

Uploaded by

Research Guy
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

TOP SECRET//SI//NOFORN

SSO Collection Optimization


Core SSO Team:

TOP SECRET//SI//NOFORN

TOP SECRET//SI//NOFORN

TUDDS Block

TOP SECRET//SI//NOFORN

TOP SECRET//SI//NOFORN

TUDDS Block

TOP SECRET//SI//NOFORN

TOP SECRET//SI//NOFORN

Current Efforts - Google


! Defeat Fingerprints defeat/dev/google/adwords defeat/dev/google/bigtable defeat/dev/google/blogger_js defeat/dev/google/teragoogle

TOP SECRET//SI//NOFORN

TOP SECRET//SI//NOFORN

Serendipity New Protocols

TOP SECRET//SI//NOFORN

You might also like