Microsoft has now confirmed that the Russian cyberspies who broke into its executives' email accounts stole source code and gained access to internal systems. The Redmond giant also characterized the intrusion as "ongoing."
A cyberattack tied to the Chinese government penetrated the networks of a swath of U.S. broadband providers, potentially accessing information from systems the federal government uses for court-authorized network wiretapping requests.
For months or longer, the hackers might have held access to network infrastructure used to cooperate with lawful U.S. requests for communications data, according to people familiar with the matter, which amounts to a major national security risk. The attackers also had access to other tranches of more generic internet traffic, they said.
When these programmers made a good chunk of this stuff back in the 90's, security wasnt really a big thought in the process. There are security holes everywhere. Israel seems to have access to everything as well.
The internet is just one big leaky sieve apparently.
In some dystopia books/movies, ai have destroyed the original internet exploiting everything, and you cant use it without having some kinda of ai to defend against it.
Gather more personal information from people and apply more restrictions to "better protect your personal information". :)
Banks just sell clients personal data to whoever pay good money, from advertisers to criminals. It is very helpful to know how many money somebody have and where he lives for everything from trade to theft.
To drive home the need for strict cyber security in order to soften the market for issuance of implantable biometrics and all economic use via biometrics. I've also read a really cool really old book that says we should totally not do that so, choose wisely.
Data implies ongoing transmission (perceivable) or temporary storage (suggested)...few utilize data as a transmittable current, while tempting many to store data as an evaluated currency.
Fake breaches are used to distract those who temporary store from the ongoing transmission of what they are storing.
The trick...ones ignorance blocks ones discernment of being a breach aka of being within the act (inception towards death) of breaking apart (life).
thoughts on the motive
Those who hold onto suggested data ignore the perceivable motive force. Thinking about suggested data implies circular logic aka 0 vs 1 aka binary thinking.
Is pushing digital ids because nothing is safr until you get your eyes scanned or whatever
What makes you think their faking being hacked?
Lmao microsoft got hacked like 2x in the last few years and lost the source code to windows. That aint good.
Reading about how the chinese have infiltrated nsa backdoors.
I dont think its all fake lmao.
https://www.theregister.com/2024/03/08/microsoft_confirms_russian_spies_stole/
https://archive.is/c6zQj
When these programmers made a good chunk of this stuff back in the 90's, security wasnt really a big thought in the process. There are security holes everywhere. Israel seems to have access to everything as well.
The internet is just one big leaky sieve apparently.
In some dystopia books/movies, ai have destroyed the original internet exploiting everything, and you cant use it without having some kinda of ai to defend against it.
Doesnt seem that far off honestly.
Gather more personal information from people and apply more restrictions to "better protect your personal information". :)
Banks just sell clients personal data to whoever pay good money, from advertisers to criminals. It is very helpful to know how many money somebody have and where he lives for everything from trade to theft.
To drive home the need for strict cyber security in order to soften the market for issuance of implantable biometrics and all economic use via biometrics. I've also read a really cool really old book that says we should totally not do that so, choose wisely.
That would be good reason to enforce biometrics.
Wasn't the mark of the beast on the head and hand?
Not yet but I've heard something similar.
Ok there pajeet boy. simmer down now.
Data implies ongoing transmission (perceivable) or temporary storage (suggested)...few utilize data as a transmittable current, while tempting many to store data as an evaluated currency.
Fake breaches are used to distract those who temporary store from the ongoing transmission of what they are storing.
The trick...ones ignorance blocks ones discernment of being a breach aka of being within the act (inception towards death) of breaking apart (life).
Those who hold onto suggested data ignore the perceivable motive force. Thinking about suggested data implies circular logic aka 0 vs 1 aka binary thinking.