IPB

Welcome Guest ( Log In | Register )

 
Reply to this topicStart new topic
> Offensive cybersecurity?
hobgoblin
post Sep 15 2011, 06:53 PM
Post #1


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



http://arstechnica.com/tech-policy/news/20...ity-offense.ars

Black IC here we come?
Go to the top of the page
 
+Quote Post
Seriously Mike
post Sep 15 2011, 07:28 PM
Post #2


Moving Target
**

Group: Members
Posts: 770
Joined: 19-August 11
From: Middle-Eastern Europe
Member No.: 36,268



I'd rather say "Aaron Barr gets his dumb ass hacked again to prove it's a bad idea".
Go to the top of the page
 
+Quote Post
AppliedCheese
post Sep 15 2011, 07:35 PM
Post #3


Moving Target
**

Group: Members
Posts: 459
Joined: 2-October 10
Member No.: 19,092



Meh. The core concept is correct. Bouncing around publicly about it may be less than intelligent, but you need to approach hackers like you do terrorists. Identify, track, develop, infiltrate, exploit, destroy. Especially in groups.
Go to the top of the page
 
+Quote Post
Mardrax
post Sep 15 2011, 11:21 PM
Post #4


Running Target
***

Group: Members
Posts: 1,083
Joined: 13-December 10
From: Rotterdam, The Netherlands
Member No.: 19,228



QUOTE (AppliedCheese @ Sep 15 2011, 09:35 PM) *
Identify, track, develop, infiltrate, exploit, destroy. Especially in groups.

You mean Analyze, Trace, Probe, Stealth, Edit, Attack?
Go to the top of the page
 
+Quote Post
suoq
post Sep 16 2011, 03:08 AM
Post #5


Running Target
***

Group: Members
Posts: 1,272
Joined: 22-June 10
From: Omaha. NE
Member No.: 18,746



QUOTE (hobgoblin @ Sep 15 2011, 01:53 PM) *
Black IC here we come?

Not from Barr. The man is a threat to himself and his companies, not anyone else.

Until we have DNI, there's no real point to Black IC. If someone wants to attack X, they don't attack FROM home. They attack Y, use Y to attack X, and then clean Y. Or more modernly, use entire alphabets in much the same way. It also works to attack Y, set up Y, clean up Y, and then go to the movies and let Y's crontab do their dirty work.

The only people Barr is ever going to get are those people who know less than Barr. All three of them.
Go to the top of the page
 
+Quote Post
CanRay
post Sep 16 2011, 03:14 AM
Post #6


Immortal Elf
**********

Group: Dumpshocked
Posts: 14,358
Joined: 2-December 07
From: Winnipeg, Manitoba, Canada
Member No.: 14,465



If by "Offensive" you mean manners, then, yes, he is offensive. (IMG:style_emoticons/default/nyahnyah.gif)
Go to the top of the page
 
+Quote Post
hobgoblin
post Sep 16 2011, 06:55 AM
Post #7


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



QUOTE (Mardrax @ Sep 16 2011, 01:21 AM) *
You mean Analyze, Trace, Probe, Stealth, Edit, Attack?

Or perhaps Black Hammer rather then Attack (IMG:style_emoticons/default/wink.gif)
Go to the top of the page
 
+Quote Post
hobgoblin
post Sep 16 2011, 06:55 AM
Post #8


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



QUOTE (suoq @ Sep 16 2011, 05:08 AM) *
Until we have DNI, there's no real point to Black IC. If someone wants to attack X, they don't attack FROM home. They attack Y, use Y to attack X, and then clean Y. Or more modernly, use entire alphabets in much the same way. It also works to attack Y, set up Y, clean up Y, and then go to the movies and let Y's crontab do their dirty work.

If only everyone was that smart...
Go to the top of the page
 
+Quote Post
hobgoblin
post Sep 16 2011, 06:56 AM
Post #9


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



QUOTE (AppliedCheese @ Sep 15 2011, 09:35 PM) *
Meh. The core concept is correct. Bouncing around publicly about it may be less than intelligent, but you need to approach hackers like you do terrorists. Identify, track, develop, infiltrate, exploit, destroy. Especially in groups.

From the looks of it, the various police departments around the world have been doing just that.
Go to the top of the page
 
+Quote Post

Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 29th March 2024 - 09:26 AM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.