Skip to main content

View Diary: Amnesty International weighs in on the Miranda detention (131 comments)

Comment Preferences

  •  I wouldn't be so sure about that. There are quite (4+ / 0-)
    Recommended by:
    kharma, Lisa Lockwood, koNko, elwior

    a few botnets and other such tools that make FLAME look like a child's toy.  Sure, none of them target SCADA systems but that is because they want to make money off them, not commit acts of sabotage/terrorism.

    Heck, some of the old school viruses were far more sophisticated in what they did especially given the limited hardware and what passed for an OS (i.e. DOS) back then.  Just look at some of the stuff the demoscene puts out if you want to see some of that kind of sophistication today in a safe and non-malicious way.

    You have watched Faux News, now lose 2d10 SAN.

    by Throw The Bums Out on Mon Aug 19, 2013 at 03:40:42 AM PDT

    [ Parent ]

    •  I'd be very interested in any cases of botnets (2+ / 0-)
      Recommended by:
      CroneWit, elwior

      More sophisticated than Flame or Stuxnet, which have some of the most ingenious coding seen in years, specifically, the chosen-prefix collision attack coding which partly accounts for the early conclusion they were the work of some very high level coders with a big budget. And by the way, one of the tell-tale "signatures" was some "old school" coding uncharacteristic of more contemporary viruses and malware.

      But if you have any links to documents about botnets running more sophisticated codes, they would be appreciated.

      Most code used by criminals are actually pretty crude and the basic reason to use botnets, aside from secrecy, is to launch a massive number of attacks to find random computers with vulnerabilities to exploit.

      My own VPN server, which is pretty anonymous and of no discernible interest, logs hundreds to thousands of attempted entires per month, most of them repetitive attacks I assume to be from botnets that never get past the firewall because they are unsophisticated, known and easily filtered, and this is the typical experience.

      Maybe we need to define sophisticated? I was pretty impressed with the Flame code and analysis published on security boards.

      400ppm : what about my daughter's future?

      by koNko on Mon Aug 19, 2013 at 06:08:54 AM PDT

      [ Parent ]

      •  You might want to check slashdot for that kind (1+ / 0-)
        Recommended by:

        of thing because there have been several which were nearly impossible to take down and it was pure luck that there were RNG vulnerabilities in the public key encryption and such flaws.

        You have watched Faux News, now lose 2d10 SAN.

        by Throw The Bums Out on Mon Aug 19, 2013 at 11:29:33 AM PDT

        [ Parent ]

      •  Did you read the chats with HB Gary and (0+ / 0-)


        I got pretty deep into that story and Greg was supposedly working on some crazy sophisticated rootkit.

        That these types of guys were engaged in sliming Greenwald and taking out enemies of the Establishment for millions per month, made the NSA story much different, I think than for most people.

        Democracy - 1 person 1 vote. Free Markets - More dollars more power.

        by k9disc on Mon Aug 19, 2013 at 11:25:01 PM PDT

        [ Parent ]

Subscribe or Donate to support Daily Kos.

Click here for the mobile view of the site