{"id":96825,"date":"2019-09-30T01:42:57","date_gmt":"2019-09-30T08:42:57","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2019\/09\/the-nsa-makes-its-powerful-cybersecurity-tool-open-source"},"modified":"2019-09-30T01:42:57","modified_gmt":"2019-09-30T08:42:57","slug":"the-nsa-makes-its-powerful-cybersecurity-tool-open-source","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2019\/09\/the-nsa-makes-its-powerful-cybersecurity-tool-open-source","title":{"rendered":"The NSA Makes Its Powerful Cybersecurity Tool Open Source"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/the-nsa-makes-its-powerful-cybersecurity-tool-open-source3.jpg\"><\/a><\/p>\n<p>The National Security Agency develops advanced hacking tools in-house for both offense and defense\u2014which you could probably guess even if some notable examples hadn\u2019t leaked in recent years. But on Tuesday at the RSA security conference in San Francisco, the agency demonstrated Ghidra, a refined internal tool that it has chosen to open source. And while NSA cybersecurity adviser Rob Joyce called the tool a \u201ccontribution to the nation\u2019s cybersecurity community\u201d in announcing it at RSA, it will no doubt be used far beyond the United States.<\/p>\n<hr>\n<p>No one\u2019s better at hacking than the NSA. And now one of its powerful tools is available to everyone for free.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The National Security Agency develops advanced hacking tools in-house for both offense and defense\u2014which you could probably guess even if some notable examples hadn\u2019t leaked in recent years. But on Tuesday at the RSA security conference in San Francisco, the agency demonstrated Ghidra, a refined internal tool that it has chosen to open source. And [\u2026]<\/p>\n","protected":false},"author":534,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,1412],"tags":[],"class_list":["post-96825","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-privacy"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/96825","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/534"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=96825"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/96825\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=96825"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=96825"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=96825"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}