Difference between revisions of "Cyberattack"

From Wikispooks
Jump to navigation Jump to search
(Removed redirect to Cyberterrorism)
Tag: Removed redirect
({{FA|Cyber attack/Preparation}})
Line 8: Line 8:
  
 
'''Cyber attacks''' are a new form of large scale [[security hole]]s, which suspiciously emerge simultaneously in software used by i.e government agencies, banks and microsoft.   
 
'''Cyber attacks''' are a new form of large scale [[security hole]]s, which suspiciously emerge simultaneously in software used by i.e government agencies, banks and microsoft.   
 +
 +
==Preparations==
 +
{{FA|Cyber attack/Preparation}}
 +
China might be accused of a "Cyber attack" (i.e. chips, power grip, supply chain, etc.) [[planning exercise]]s suggest in their "computer simulations".<ref>Interview with [[Martin Armstrong]]
 +
https://www.youtube.com/watch?v=2K6RwoA3EDs
 +
</ref>
  
 
==Official narrative==
 
==Official narrative==

Revision as of 19:00, 31 December 2021

Concept.png "Cyberattack"
(“Disaster”)Rdf-entity.pngRdf-icon.png
Subpage(s)Cyberattack/Preparation
Cyber attacks are a new form of large scale security holes, which suspiciously emerge from an (unknown) central point in government software all over the world

Cyber attacks are a new form of large scale security holes, which suspiciously emerge simultaneously in software used by i.e government agencies, banks and microsoft.

Preparations

Full article: Cyber attack/Preparation

China might be accused of a "Cyber attack" (i.e. chips, power grip, supply chain, etc.) planning exercises suggest in their "computer simulations".[1]

Official narrative

We are too stupid to write our own code and must therefore rely on third party software produced by (foreign) intelligence-connected companies. We are also too stupid to avoid basic errors in system administration. This is so horrible that the financial system might collapse soon!

Problems

The backdoors are deliberately placed pieces of malware, typically (SolarWinds) from a central untrustworthy origin. I.e. not buffer overflows or systemic, or hardware vulnerabilities. This poses the question: at which level and with which security clearances are these higher-up developers controlled and monitored? These are developers above the nation state level.[2] There is no plausible reason why governments would not be able to audit crucial software themselves or why they should trust private companies.


Many thanks to our Patrons who cover ~2/3 of our hosting bill. Please join them if you can.


References


57px-Notepad icon.png This is a page stub. Please add to it.