It’s starting to get weird out there. When WikiLeaks released classified U.S. government documents in December, it sparked several rounds of online conflict. WikiLeaks became the target of denial-of-service attacks and lost the support of its hosting and payment providers, which inspired sympathizers to counterattack, briefly bringing down the sites of MasterCard and a few other companies. Sites related to the hackers were then attacked, and mirror sites sprang up claiming to host copies of the WikiLeaks documents--although some were said to carry viruses ready to take over the machines of those who downloaded the copies, for who knows what end. Months before, an FBI official said disruption of the Internet was the greatest active risk to the U.S. “other than a weapon of mass destruction or a bomb in one of our major cities.”Attacks on Internet sites and infrastructure, and the compromise of secure information, pose a particularly tricky problem because it is usually impossible to trace an attack back to its instigator. This “attribution problem” is so troublesome that some law-enforcement experts have called for a wholesale reworking of Internet architecture and protocols, such that every packet of data is engraved with the identity of its source. The idea is to make punishment, and therefore deterrence, possible. Unfortunately, such a reworking would also threaten what makes the Internet special, both technologically and socially. [More]
Samsung eavesdropping
Cool best spy
best spying utility
yes spying counts
Saturday, April 16, 2011
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment