On Jan 15, 2010, at 10:43 AM, Jared Mauch wrote: > > On Jan 15, 2010, at 10:37 AM, Jon Lewis wrote: > >> Does anyone really believe that the use of targeted 0-day exploits to gain >> unauthorized access to information hasn't been at least considered if not >> used by spies working for other [than China] countries? > > I think only those not paying attention would be left with that impression. > > Spying has been done for years on every side of various issues. Build a more > complex system, someone will eventually find the weak points. > > Personally I was amused at people adding cement to USB ports to mitigate > against the "removable media threat". The issue I see is people forget that > floppies posed the same threat back in the day. > > The reality is that the technology is complex and easily used in asymmetrical > ways, either for DDoS or for other purposes. > > The game is the same, it's just that some people are paying attention this > week. It will soon go back to being harmless background radiation for most > of us soon. >
The "difference" this week is motive. In the 1980s-1990s, we had joy-hacking. In the 2000s, we had profit-motivated hacking by criminals. We now have (and have had for a few years) what appears to be nation-state hacking. The differences are in targets and resources available to the attacker. --Steve Bellovin, http://www.cs.columbia.edu/~smb