|
If 100TB were stolen through probably the most closely watched 4 internet connections on the planet that would indeed be some feat.
It could maybe be a disgruntled ex-employee blackmailing them while also throwing the press a false scent trail.
|
|
|
|
|
Or, just throwing this out there, an employee/disgruntled former employee was paid big bucks to help facilitate this?
It seems as though Sony's IT security situation was pretty woeful, and it's not implausible that NK could have paid somebody (maybe through some hard to trace medium such as Bitcoin) who used to work for them (they had a lot of IT related lay-offs recently) some money to walk them through accessing the system etc.
modified 22-Dec-14 18:11pm.
|
|
|
|
|
Isn't it all.
Usually at least one side must "fancy their chances" to instigate the war in the first place.
"If you don't fail at least 90 percent of the time, you're not aiming high enough."
Alan Kay.
|
|
|
|
|
I believe it's been ongoing since many years, just slightly less open.
Wrong is evil and must be defeated. - Jeff Ello
(√-sh*t) 2
|
|
|
|
|
|
"Attack" is pretty sensationalist.
North Korea get's their internet from China, and before this there was speculation that the US was enlisting the help of other countries to ensure NK couldn't carry out another such attack and that one of their approaches involved simply asking China to turn off their internet access.
Isn't it more likely they asked China to do this, and they simply complied as they also recognise that there is a major problem here?
modified 22-Dec-14 16:06pm.
|
|
|
|
|
JMK-NI wrote: and they simply complied
Not a chance! China quietly applauds NK's actions. The UN Security Council just overrode China's objections to add NK to their agenda on human rights.
The difficult we do right away...
...the impossible takes slightly longer.
|
|
|
|
|
Fair enough, just applying Occam's Razor.
The alternative is that somebody with the means to do so performed a cyber attack on North Korea. Which is way more interesting!
|
|
|
|
|
False flag designed by govt to pass cyber security bill.
.'\ /`.
.'.-.`-'.-.`.
..._: .-. .-. :_...
.' '-.(o ) (o ).-' `.
: _ _ _`~(_)~`_ _ _ :
: /: ' .-=_ _=-. ` ;\ :
: :|-.._ ' ` _..-|: :
: `:| |`:-:-.-:-:'| |:' :
`. `.| | | | | | |.' .'
`. `-:_| | |_:-' .'
`-._ ```` _.-'
``-------'/xml>
|
|
|
|
|
N. Korea's internet has been restored. Nothing short of a physical cable cut is going to do the job. However, you first have to fully believe that N. Korea is responsible for the Sony hack to begin with. All we have for evidence is a corrupt US spy agency's wild-eyed claims.
".45 ACP - because shooting twice is just silly" - JSOP, 2010 ----- You can never have too much ammo - unless you're swimming, or on fire. - JSOP, 2010 ----- When you pry the gun from my cold dead hands, be careful - the barrel will be very hot. - JSOP, 2013
|
|
|
|
|
University of Illinois Professor Jennifer Wiley determined that a person's "creative peak" comes when their blood alcohol level reaches 0.075, lowering their ability to overthink during a task. New Year's Resolution: Optimizing creativity all year
|
|
|
|
|
Can you remove the ambiguity? What does this tell us, to drink or to avoid it.
The sh*t I complain about
It's like there ain't a cloud in the sky and it's raining out - Eminem
~! Firewall !~
|
|
|
|
|
Drink, and plenty - apparently "peak creativity" is 0.075 blood alcohol (illegal to drive around these parts, so I guess you just have to stay in one spot and remain creative).
TTFN - Kent
|
|
|
|
|
hehe, I believe he was also drunk at that time!
The sh*t I complain about
It's like there ain't a cloud in the sky and it's raining out - Eminem
~! Firewall !~
|
|
|
|
|
* Footnote: This peak creativity rating was determined while at peak creativity.
|
|
|
|
|
So I guess that means that creative driving is frowned upon.
Wrong is evil and must be defeated. - Jeff Ello
(√-sh*t) 2
|
|
|
|
|
I'd create a mess on the floor.
|
|
|
|
|
Is there an App for that?
|
|
|
|
|
How could this have been posted without a reference to the Ballmer Peak?
|
|
|
|
|
In this three-part series, I will explore, and debunk, five popular myths about C++ It did not spring, fully grown and armored, from Bjarne's skull
|
|
|
|
|
So to get a full picture you have to read a lot of very technical reports from the network security community. My understanding of the attack comes from reading (probably way too many) technical reports about it. I'll try and give the most readable sources here. Not technically a news story, but a better explanation than I've seen in any news story so far.
|
|
|
|
|
Several new programming languages emerged recently. Among them, Rust particularly interests me. "It's better to burn out than it is to rust"
|
|
|
|
|
That quote doesn't sound right; did you mean to quote the Kurgan[^]?
|
|
|
|
|
Same song[^] by St. Neil that the Kurgan quotes, but a few stanzas later.
TTFN - Kent
|
|
|
|
|
I don't know. Nowwadays, a language seems pretty meaningless without a decent library. I'm so used to the rich features of .NET that having to roll my own what I consider "low-level" classes to do basic things, well, it's a waste of time IMO.
Marc
|
|
|
|