In particular, one thing that perfectly ties Snowden’s latest documents with this toolkit is a note of tracking an exploit through a 16-character string (ace02468bdf13579) which happens to be found in the code of one exploit from the collection, called[…]