Printable Version of Topic
Dumpshock Forums _ Shadowrun _ Offensive cybersecurity?
Posted by: hobgoblin Sep 15 2011, 06:53 PM
http://arstechnica.com/tech-policy/news/2011/09/aaron-barr-is-backand-he-wants-more-cybersecurity-offense.ars
Black IC here we come?
Posted by: Seriously Mike Sep 15 2011, 07:28 PM
I'd rather say "Aaron Barr gets his dumb ass hacked again to prove it's a bad idea".
Posted by: AppliedCheese Sep 15 2011, 07:35 PM
Meh. The core concept is correct. Bouncing around publicly about it may be less than intelligent, but you need to approach hackers like you do terrorists. Identify, track, develop, infiltrate, exploit, destroy. Especially in groups.
Posted by: Mardrax Sep 15 2011, 11:21 PM
QUOTE (AppliedCheese @ Sep 15 2011, 09:35 PM)

Identify, track, develop, infiltrate, exploit, destroy. Especially in groups.
You mean Analyze, Trace, Probe, Stealth, Edit, Attack?
Posted by: suoq Sep 16 2011, 03:08 AM
QUOTE (hobgoblin @ Sep 15 2011, 01:53 PM)

Black IC here we come?
Not from Barr. The man is a threat to himself and his companies, not anyone else.
Until we have DNI, there's no real point to Black IC. If someone wants to attack X, they don't attack FROM home. They attack Y, use Y to attack X, and then clean Y. Or more modernly, use entire alphabets in much the same way. It also works to attack Y, set up Y, clean up Y, and then go to the movies and let Y's crontab do their dirty work.
The only people Barr is ever going to get are those people who know less than Barr. All three of them.
Posted by: CanRay Sep 16 2011, 03:14 AM
If by "Offensive" you mean manners, then, yes, he is offensive.
Posted by: hobgoblin Sep 16 2011, 06:55 AM
QUOTE (Mardrax @ Sep 16 2011, 01:21 AM)

You mean Analyze, Trace, Probe, Stealth, Edit, Attack?
Or perhaps Black Hammer rather then Attack
Posted by: hobgoblin Sep 16 2011, 06:55 AM
QUOTE (suoq @ Sep 16 2011, 05:08 AM)

Until we have DNI, there's no real point to Black IC. If someone wants to attack X, they don't attack FROM home. They attack Y, use Y to attack X, and then clean Y. Or more modernly, use entire alphabets in much the same way. It also works to attack Y, set up Y, clean up Y, and then go to the movies and let Y's crontab do their dirty work.
If only everyone was that smart...
Posted by: hobgoblin Sep 16 2011, 06:56 AM
QUOTE (AppliedCheese @ Sep 15 2011, 09:35 PM)

Meh. The core concept is correct. Bouncing around publicly about it may be less than intelligent, but you need to approach hackers like you do terrorists. Identify, track, develop, infiltrate, exploit, destroy. Especially in groups.
From the looks of it, the various police departments around the world have been doing just that.
Powered by Invision Power Board (http://www.invisionboard.com)
© Invision Power Services (http://www.invisionpower.com)