This story is one of the few that I know of that is actually newsworthy.
The message was sent by a man who goes by the name of Wattie, who has written on hacker forums and Twitter about the vulnerability of the RCE vulnerability.
According to Watty’s Twitter account, he is a former NSA employee who worked at Booz Allen Hamilton, a company that was once a partner in a massive hack of the e-mail servers of several large companies.
He was then a contractor with Booz, and has since left Booz.
The email is written in the style of a hacker’s manifesto, with Watties rantings about the flaws of the software he used to crack into an enterprise’s security systems.
The hacker’s message begins with a list of questions and offers an open-ended list of suggestions, including a few to address in the form of a vulnerability disclosure.
Afterward, he adds a few more links to the source code, which is posted on GitHub.
“If anyone can help me get this right and get it out to everyone,” he wrote, “please help me.”
It’s unclear whether the source of the vulnerability is the NSA, or whether Watti himself, but the code is publicly available.
As far as I can tell, Wattier has been working for the NSA for some time.
A spokesperson for Booz told The Verge that Watt’s comments are not an NSA-related vulnerability disclosure, and that the vulnerability was reported to the NSA and is being investigated.
The spokesperson added that the NSA does not provide support for hacking tools.
I contacted Watt, who confirmed that he works for the U.S. military, but declined to answer further questions about his role in the R-Secure attack.
“I’m not sure what to do with myself,” Watt told The Washington Post.
“So I don’t want to say anything.
I’ll just leave this here for now.”
A spokesperson at the NSA told The Guardian that the agency was aware of the post, and said that it had received several inquiries from Watt.
He did not provide further details.