L.W. Flouisa's picture
L.W. Flouisa from Tennessee is reading More Murakami December 10, 2015 - 11:52pm

http://www.project-syndicate.org/commentary/cyber-warfare-deterrence-by-...

What are your thoughts on this?

On mine:

  • That's not what hacking means. The media has kind of misused the term to mean something it doesn't. All it means is taking something apart and building it back together in order to improve the functionality. Traditionally it's hardware and software related.
  • That's not what Tor is for. There are plenty of valid reasons to use to. News Journalists that want a little bit of privacy, Whistle blowers, and other social servants.

I find myself personally offended, as someone who codes in Ruby myself. Like even assuming the premise is true, it would require a team. This is not even an interest in most Linux culture among my friends with said skillsets. Believe me, we have better things to do. Like build better operating systems.

I make offline profile apps, but according to this article a hacker is somebody who wants evil intent, and wants to take over the world.

Thuggish's picture
Thuggish from Vegas is reading Day of the Jackal December 11, 2015 - 11:53am

It is what hacking means. From the dictionary...

to circumvent security and break into (a network, computer, file, etc.), usually with malicious intent: Criminals hacked the bank's servers yesterday.
Our team systematically hacks our network to find vulnerabilities.

 

Where did the article mention anything called Tor?

 

What premise? That major networks get hacked? Because they do.

 

This is really an article posing the question of how the world powers might respond to the ever-growing occurance of hacking (as defined above) networks. 

 

My thoughts on this are that we're in the infancy of all this. I kind of liken it to the days when John Dillinger was running around robbing banks. The FBI didn't even exist, intra-state crime was more and more possible with the use of automobiles, blah blah... the world hadn't caught up with the people who knew how to exploit it yet. We seem to be getting there. It seems like gone are are the days that a single teenager can control a Pentagon spy satellite for a week or two. Though apparently they can get into NASA's stuff from time to time. Decades from now this sort of hack-a-palooza atmosphere is going to be shut down, I predict, once the makers of networks and whatever figure out new ways of doing things.

Anyway that's how I see it, not that I'm looking that hard, let alone any kind of expert.