Re: [liberationtech] Foxacid payload
Some, maybe all, of those sitting on Snowden docs would/are selling to the highest bidder for other clandestine hacks. The fundamental purpose of security is to do that lulling, gulling and smiling at the ease with which trust can be exploited when a manufactured crisis drives the fearful into gaping maws of protection. The especially private kind, the higher the secrecy the higher the price, is most effective. Fake highest classification markings obligatory. The frenzy to exploit Snowden revelations, tiny as they are, has saved the security industry -- mil-com-spy-edu-org-hackers -- from post-2-war decline. BTW, what are the odds all parties to the Snowden boondoggle are placing on hot war cyberwar to surpass the cool stinking-poo of AV and security vendors planting malware to foster upticks of market? No nonsense Omidyar has bet $200 million on peddling security products generated by his $50 million investment in insecurity scare news via Snowden cornicopia of NSA scare programs, which in turn have received huge boosts of counter-Snowden actions by the usual suspects of mil-com-spy-edu-org-hackers. Nothing like it since 9/11. Thank you, Edward Snowden, thank you media, for prolonging godsent cyber fear and salvation. Dust off cyber Pearl Harbor posters for Defcon, HOPE, Blackhat, this very sordid squat.
this is exactly why some who have received these payloads are sitting on them, rather than disclosing.
it is more useful to mitigate privately, and observe how/when an exploit is used, than burn it publicly for zero effective security improvement.
(the less scrupulous would sell to highest bidder for other clandestine hacks)
better ideas welcome!
best regards, -- Liberationtech is public & archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at companys@stanford.edu.
On Fri, Jul 18, 2014 at 4:46 AM, John Young <jya@pipeline.com> wrote:
... No nonsense Omidyar has bet $200 million on peddling security products generated by his $50 million investment in insecurity scare news via Snowden cornicopia of NSA scare programs, which in turn have received huge boosts of counter-Snowden actions by the usual suspects of mil-com-spy-edu-org-hackers.
modern security analysis requires ever increasing skills and knowledge, driving the pool of practitioners ever smaller. combined with demand from government and private industry for private research, paying researchers to work in the light rather than [REDACTED] a hard sell. this is one aspect of Project Zero i am keen to monitor, as the initial recruiting is top talent and top dollar. research to harden software against advanced threats and analyze advanced attacks encountered almost always locked behind non-disclosure, confidentiality, classification constraints. independent security research and state-of-the-art security research at odds, increasingly so, day by day.
Nothing like it since 9/11. Thank you, Edward Snowden, thank you media, for prolonging godsent cyber fear and salvation. Dust off cyber Pearl Harbor posters for Defcon, HOPE, Blackhat, this very sordid squat.
an industry in sorry shape[0] and much volatility, for sure. Google's "Announcing Project Zero" post itself only accessible via plain-text, attempts to https redirected back to plainly observable and trivially tamper-able. that mathematicians are having an introspective moment to consider their role in mass privacy violations, and in turn advocating for employment outside such private industries is a telling contrast to the relative silence in infosec where developing weaponized exploits, not just precursors or components, has yet to generate an honest and open discussion. "Mathematicians Urge Colleagues To Refuse To Work For The NSA" http://www.forbes.com/sites/kashmirhill/2014/06/05/mathematicians-urge-colle...
participants (2)
-
coderman
-
John Young