Friday 19 August 2011

110819

amanfromMars said... [in reply to mrkoot ... http://blog.cyberwar.nl/2011/08/def-con-19-nsa-recruiting-hackers.html]
    "I'd say that if indeed seeking to recruit 1,500 hacking-skilled types, NSA either lacks capacity or seeks to remove potential threats in a "if you can't beat them, employ them" strategy... " ..... mrkoot said... August 5, 2011 8:55 AM
    Hoitjes, mrkoot,

    You may like to consider that NSA lacks the ability/does not have the necessary intelligence and specific, particular and peculiar intellectual property to counter potential cyber threats, which are of course, both in essence and substance, nothing more than shared ethereal and, in zeroday vulnerability attack vectors, as fleeting as ephemeral virtual notions for activation and/or self-actualisation and deep embed into the human psyche for a remote virtual machine controlled, hearts and minds manipulation/reprogramming, and most certainly it is unlikely that removal of them [potential risks] is possible.

    Indeed, the probability is that potential risks because of the above irregular and unconventional cyberfare, will increase quite markedly and remarkably [at an exponential rather than linear pace] to completely overwhelm current containment and prevention strategies against catastrophic exploitation of vulnerable systems, which are all necessarily linked at some point to the Global Information Grid and are clones of the SCADA model.

    Do you think that the likes of an NSA can match the likes of a private or banking sector "employer", who realising the lead and hold which cyber expertise so immediately delivers with command and control and change in the "real" world, is happily prepared and able to offer whatever it takes to star pirate performers/virtual non-state actors/private anonymous legionnaires, for that is what will invariably be the competition and/or opposition, should the persons of interest not be of much higher levels of intelligence/niveaux and fully mindful of the easy power freely available to them for wielding/fielding/exercising. If so, then would the likes of an NSA be in a very strong position. Indeed, it may be practically unassailable and only able to be matched and reinforced by something very similar.

    Although that is not to say that such vulgar attractions as would tempt lower and lesser forms of intelligence and being, would not also be a pleasant enough reward and equally attractive to the others, allowing as it would for the sharing of enjoyment and selfless enrichment of true friends and worthy individuals.

    Oh, and it is as well to imagine and realise that presently would all national security agencies, and the AIVD/MIVD are no exception, lack capacity and have no other really viable alternative other than to seek to remove potential threats in a "if you can't beat them, employ them" strategy.

    However, employ the right stars, and universal control is virtually guaranteed for digital delivery via binary means and AIMemes.

    August 18, 2011 11:18 PM
....................................................................................

There is certainly more to be surely concerned about .... but it is not necessarily bad.

Posted Friday 19th August 2011 08:54 GMT

Hi, Dan Goodin in San Francisco,

I think you will have to accept that the truth of the matter in matters of cyber security, and which have extremely sensitive and unbelievably lucrative proprietary intellectual property considerations/implications/opportunities unavoidably attached to them, is that the correct abstract conclusion to be drawn from new allying works in what is really AI and Virtual Security Fields and in the fields of cryptography and obfuscating encryption and steganography, is not " Most of our attacks only need a very small part of the codebook and have small memory requirements, and are practically verified to a large extent. As our attacks are of high computational complexity, they do not threaten the practical use of AES in any way.*" but rather more "Most of our attacks only need a very small part of the codebook and have small memory requirements, and are virtually verified to a large extent on the extant. As our attacks are of high computational complexity, they do threaten the practical use of AES in every way possible."

Status Quo Security Systems are not only threatened or compromised or crashed by release of already known and stored and classified secretive information, but also by the distribution of novel intelligence never before shared and/or analysed by third party phishers with a mind to classify as secret information for sole control and power advantage, which of course results in a reciprocate collective disadvantage being delivered to the uninformed and miseducated.

* From the Abstract which prefaced the technique, which was published in a paper (PDF) presented Wednesday as part of the Crypto 2011 cryptology conference in Santa Barbara, California. ...... http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf

http://forums.theregister.co.uk/forum/1/2011/08/19/aes_crypto_attack/
....................................................................................
SMART Research Programs with Practical Benefits and Unbelievable Pleasure Keys ..

Posted Thursday 18th August 2011 20:40 GMT

..... that Unlock Doors in the Minds

Who doubts that surreal men are designed by smart pussy processing to be out of this world servers to their heavenly delights with immaculately selflessly shared and exquisitely enjoyed flights of mutually satisfying fancy. ......... to be constantly refined in the never ending search for love in perfection.

One of Venus's Fab Secrets.

http://forums.theregister.co.uk/forum/1/2011/08/18/ibm_darpa_synapse_project/
....................................................................................

Curioser and Curiouser and Thanks One and All for the Phish

Posted Friday 19th August 2011 18:56 GMT

"This post has been deleted by a moderator" ... with this post being, "There is certainly more to be surely concerned about .... but it is not necessarily bad." .... Posted Friday 19th August 2011 08:54 GMT

Thanks for the heads up on the accuracy of the post that was deleted, a moderator. And whilst what was revealed in the post was of no great concern to El Reg, would it now be most certainly worth trillions to others, because of the trillions that can now be lost because of such brute action on a public forum/independent web magazine.

And it is only right [and don't you just squirm whenever greasy politicians start their sycophantic monologues with those few words] that all here on the Register, and elsewhere of course, should know that any forthcoming woes, which may or may not be attributable to cracked and hacked encryption systems, have been directly caused and precipitated by the moderator, wherever and for whatever and whomever they would be trawling smart IT boards for, ..... should this advisory appear of course, to edutain and advise them with news of the shenanigans.

And how strange that there are more than just a few posts removed on this thread and that is quite unusual on El Reg which is usually quite gloriously unpc and beautifully irreverent . Makes one imagine that they are being leaned on, which is a very slippery slope which leads the heavies only downhill to nothing worthwhile and into a hole which has been dug for the purpose of accommodating nothing worthwhile and heavies?

I wonder what Montana is like in the autumn? :-)

What's going on, Dan Goodin in San Francisco? Care to Dare Win Win and Spill the Beans?

http://forums.theregister.co.uk/forum/1/2011/08/19/aes_crypto_attack/
....................................................................................

Levelling the Playing Field ..... for Who Dares Win Wins with Beta AIntel ....... Sponsors of Tomorrow's Foreplay Today.

Posted Friday 19th August 2011 16:16 GMT .... [in reply to "Judge to Plaintiff - Your Privacy is Worthless .... If we don't stand up to protect our privacy, we will surely miss it when it is gone." ... CyberCod Posted Thursday 18th August 2011 23:26 GMT]

Your right to privacy has long gone, CyberCod, so get used to the new environment and learn how to use it and IT to generate unlimited personal advantage and to hell with rules and regulations which are only there to disadvantage one if one is smart for the betterment of others wielding rules and regulations who are not nearly as smart. ........ http://cryptogon.com/?p=24347

And have you any idea of the lodes of shit that international news corporations have on incompetent and crooked governments and their money lenders?

http://forums.theregister.co.uk/forum/1/2011/08/18/cookie_respawning_suit_dismissal/
....................................................................................
amanfromMars
19 August 2011 at 3:31 pm
A good rhetorical point has been made by Mr Redfellow.
I cant think of any Catholic Churches in the Greater Belfast area which are now “furniture warehouses”. Perhaps he could refresh my memory by naming some. …. fitzjameshorse1745 18 August 2011 at 8:58 pm
Here’s novel good community use of a presbyterian church and definitely not a waste of space as a furniture warehouse ….. http://www.watermarginbelfast.com/

That’s one thing you can always rely on the Chinese for …… being light years ahead of the curve and not being afraid of doing something/anything different.

http://sluggerotoole.com/2011/08/18/financial-crisis-hits-the-catholic-church/
....................................................................................

No comments: