Help - Search - Members - Calendar
Full Version: Offensive cybersecurity?
Dumpshock Forums > Discussion > Shadowrun
hobgoblin
http://arstechnica.com/tech-policy/news/20...ity-offense.ars

Black IC here we come?
Seriously Mike
I'd rather say "Aaron Barr gets his dumb ass hacked again to prove it's a bad idea".
AppliedCheese
Meh. The core concept is correct. Bouncing around publicly about it may be less than intelligent, but you need to approach hackers like you do terrorists. Identify, track, develop, infiltrate, exploit, destroy. Especially in groups.
Mardrax
QUOTE (AppliedCheese @ Sep 15 2011, 09:35 PM) *
Identify, track, develop, infiltrate, exploit, destroy. Especially in groups.

You mean Analyze, Trace, Probe, Stealth, Edit, Attack?
suoq
QUOTE (hobgoblin @ Sep 15 2011, 01:53 PM) *
Black IC here we come?

Not from Barr. The man is a threat to himself and his companies, not anyone else.

Until we have DNI, there's no real point to Black IC. If someone wants to attack X, they don't attack FROM home. They attack Y, use Y to attack X, and then clean Y. Or more modernly, use entire alphabets in much the same way. It also works to attack Y, set up Y, clean up Y, and then go to the movies and let Y's crontab do their dirty work.

The only people Barr is ever going to get are those people who know less than Barr. All three of them.
CanRay
If by "Offensive" you mean manners, then, yes, he is offensive. nyahnyah.gif
hobgoblin
QUOTE (Mardrax @ Sep 16 2011, 01:21 AM) *
You mean Analyze, Trace, Probe, Stealth, Edit, Attack?

Or perhaps Black Hammer rather then Attack wink.gif
hobgoblin
QUOTE (suoq @ Sep 16 2011, 05:08 AM) *
Until we have DNI, there's no real point to Black IC. If someone wants to attack X, they don't attack FROM home. They attack Y, use Y to attack X, and then clean Y. Or more modernly, use entire alphabets in much the same way. It also works to attack Y, set up Y, clean up Y, and then go to the movies and let Y's crontab do their dirty work.

If only everyone was that smart...
hobgoblin
QUOTE (AppliedCheese @ Sep 15 2011, 09:35 PM) *
Meh. The core concept is correct. Bouncing around publicly about it may be less than intelligent, but you need to approach hackers like you do terrorists. Identify, track, develop, infiltrate, exploit, destroy. Especially in groups.

From the looks of it, the various police departments around the world have been doing just that.
This is a "lo-fi" version of our main content. To view the full version with more information, formatting and images, please click here.
Dumpshock Forums © 2001-2012