‘This risk is real and could be exploited by adversaries of the US,’ warned the Dutch whistleblower who discovered them.

  • deafboy@lemmy.world
    link
    fedilink
    English
    arrow-up
    4
    ·
    1 year ago

    More specifically, how does the .ml provider know the content of these messages? Do they just spoof MX for all unregistered domains, or did they specifically register the domain names mimicking the US military hostnames? Both scenarios seem sketchy.

    • laylawashere44@lemmy.blahaj.zone
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 year ago

      It’s described in the article. The Dutchman who runs the registrar for Mali first started to started to store the emails sent to these invalid addresses before being overwhelmed (and probably realising the literal minefield having US government secrets is) and stopping doing that. So yes his firm was initially intercepting messages sent to the aether by spoofing invalid addresses.