[ExI] my unified theory on what really happened at the state department
William Flynn Wallace
foozler83 at gmail.com
Wed May 11 16:55:13 UTC 2016
Also, for all the fear and paranoia about the capabilities of foreign
hackers...most of them, even the professionals, are script kiddies,
"untrained" by the standards of most senior software engineers in the US.
Which is not to say there aren't good ones out there, but seriously, most
of the hacking is banal stuff that most people on this list - even the
non-IT-specialists, but who have read about the basics of computer security
thanks to this list - would casually brush off. adrian
Dark Territory - history of the cyberwar. I have finished it and recommend
it to everyone who thinks they know something about hacking, the NSA, Cia,
FBI, and numerous bureaus in DC involved as well as private business, and
what foreign countries are doing and their capabilities. It's up to date
to April 2015. A real inside job, so to speak. Got mine at the library.
We have been in everyone's computers and they have been in ours, government
and private business, for a long time. REad how Iran got into thousands of
computers and erased the drives because an Israeli who owns a casino
organization criticized Iran. They could have stolen millions of dollars
but did not, presumably because they just wanted to make a point. It is
far, far more sophisticated than Adrian implies. And large = hundreds of
people dealing with thousands of cyberthreats daily.
bill w
On Wed, May 11, 2016 at 1:43 AM, Adrian Tymes <atymes at gmail.com> wrote:
> On Tue, May 10, 2016 at 8:27 PM, spike <spike66 at att.net> wrote:
>
>> With that theory in mind, and Guccifer’s plausible explanations for how
>> he got in there, how easy it was and how the server was “an open orchid on
>> the internet” I must conclude that others found the same weakness, military
>> organizations who damn sure were and are interested in politics, parties
>> who have vested interest in keeping quiet for now that they have the entire
>> archives, who now have vested interest in seeing Hilliary elected president.
>>
>
> Granting your theory for sake of argument, it does not necessarily follow
> that others must necessarily have hacked in.
>
> It's certainly possible. It'd be foolish to assume they definitely did
> not. But...it is also incorrect, and can lead to problems, if one assumes
> that anyone did, let alone any specific one.
>
> In order to hack something, one must know that it is there. Who would
> have thought that the Secretary of State would have had her own email
> server? If you think it isn't there, you aren't going to attack it except
> by accident.
>
> Also, for all the fear and paranoia about the capabilities of foreign
> hackers...most of them, even the professionals, are script kiddies,
> "untrained" by the standards of most senior software engineers in the US.
> Which is not to say there aren't good ones out there, but seriously, most
> of the hacking is banal stuff that most people on this list - even the
> non-IT-specialists, but who have read about the basics of computer security
> thanks to this list - would casually brush off.
>
> So we don't know whether it was hacked. Assuming that foreign operators
> have the emails - and that they will act rationally based on that info -
> leads to predictions that will not match what actually happens.
>
> _______________________________________________
> extropy-chat mailing list
> extropy-chat at lists.extropy.org
> http://lists.extropy.org/mailman/listinfo.cgi/extropy-chat
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.extropy.org/pipermail/extropy-chat/attachments/20160511/3b7dce47/attachment.html>
More information about the extropy-chat
mailing list