Biggest Cyber attack ever

My impression is that there isn't much distinction between what is contracted to companies and what is done in house. It's a big world but at the same time a small one.

Going back to the leaks Snowden (himself working for a contractor) released, there's a lot of cooperation going on.

Do you know what Solarwinds actually sells? Have you ever purchased anything from them?
 
Do you know what Solarwinds actually sells? Have you ever purchased anything from them?

Only from the news and no. Off-the-shelf management software, and the seem to be buying into several kinds of IT markets, having acquired other companies. So it's fair for you to call it just another big (albeit a dwarf compared to the really big ones) IT corporation.
It's still part of the same group of peddlers and enablers of security theater. Didn't Oracle too get its start selling to the government's data mining needs? Wasn't the goal of collecting information achieved through the cooperation of all the companies involved in providing the tools and infrastructure for managing information?

Increased complexity to be managed by bigger tools and integration and so on. All the time increasing the breadth of the systems and hence the problem. These are the creators of the problems they claim they will solve. They necessarily are part of the same culture of the major users and abusers of data. IT has been helping ruin the world.
 
This is overly simplistic at best. Replace "hackers" with any state-driven element, like navy, space program, espionage capabilities, nuclear weapon program, etc etc, and it becomes more obvious, and "having better hackers" is less reliant on heavy GDP spending than any of those.

This may be of some help to you: https://www.zdnet.com/article/hacki...oing-to-emerge-as-major-threats-in-the-2020s/

"Over the last five years there have been tactical evolutions along with new malware and new techniques, but they haven't taken a jump up to compete with the volume of Chinese attacks or the sophistication of the Russian groups," says Benjamin Read, senior manager of cyber-espionage analysis at FireEye.

Keep to your promise of ignoring me, less vomit inducing that way since bad faith makes discussion impossible and bait camouflaging is overly simplistic at best.
 
Last edited:
These are the creators of the problems they claim they will solve. They necessarily are part of the same culture of the major users and abusers of data. IT has been helping ruin the world.
This is a grossly-reductive take that generalises an entire industry on the backs of bad faith actors and / or corporate corruption.
 
Only from the news and no. Off-the-shelf management software, and the seem to be buying into several kinds of IT markets, having acquired other companies. So it's fair for you to call it just another big (albeit a dwarf compared to the really big ones) IT corporation.
It's still part of the same group of peddlers and enablers of security theater. Didn't Oracle too get its start selling to the government's data mining needs? Wasn't the goal of collecting information achieved through the cooperation of all the companies involved in providing the tools and infrastructure for managing information?

Increased complexity to be managed by bigger tools and integration and so on. All the time increasing the breadth of the systems and hence the problem. These are the creators of the problems they claim they will solve. They necessarily are part of the same culture of the major users and abusers of data. IT has been helping ruin the world.

I guess there's nothing else for me to tell you then, except "You're welcome."
 
Wind powered solar panels.
 
light-sail-finally-sailin-gif_1024.gif
 
like ı should challenge it with something real , instead of CGl as above !

Spoiler :

----
CountDookusSolarSailer-WotF.png
----
 
Yet another example of closed source code giving a lot of people a bad day

Encrochat: Secret network messages can be used in court, judges rule

A bunch of crims paid loads of money for some closed source "secure" mobile phone. Surprisingly it was not actually secure and a lot of them are looking at a lot of porridge all over europe.

The problem of securing the content of messages has been solved in open source software. The problem of metadata has not been completely solved, but with tor a lot of people manage to do this without getting caught. There are plenty of open source OS's for phones that can do this.

If you care about security, do not use closed source software.
 
Last edited:
If you care about security, do not use closed source software.

I don’t think that’s a very useful rule of thumb, there’s open source software that’s bad at security and closed source software that’s good at security. Nobody is getting fooled into using closed source software on the basis of spurious security claims. (That’s not to say that people don’t use closed source software making spurious security claims, but people choosing that software aren’t taking security into account anyway.)

Not to mention the various software that has various levels of source availability without being open source.

My thoughts on GPG line up pretty well with Moxie’s: GPG and Me
 
Back
Top Bottom