updog | 15 years ago | on: Y Combinator founder: there is no tech bubble
updog's comments
updog | 15 years ago | on: Rubinius Announces Plans for GIL Elimination, JIT Improvements, Targetable VM
updog | 15 years ago | on: Stuxnet is now on GitHub
updog | 15 years ago | on: Stuxnet is now on GitHub
updog | 15 years ago | on: Stuxnet is now on GitHub
updog | 15 years ago | on: Bitcoins Cryptocurrency explained by Steve Gibson
updog | 15 years ago | on: Stuxnet is now on GitHub
updog | 15 years ago | on: Stuxnet is now on GitHub
updog | 15 years ago | on: Does my company have IP rights to the stuff I do in my spare time?
updog | 15 years ago | on: Does my company have IP rights to the stuff I do in my spare time?
updog | 15 years ago | on: House Fails to Extend Patriot Act Spy Powers
updog | 15 years ago | on: How Americans Get Out of Credit Card Debt
Haha, just hold back 6 months salary! You make it sound so easy!
It's not that they didn't prepare, it's that many of them have no means to prepare, and barely have the means to continue as is.
Many also believe that it is worth risking living on the edge to support a better school for their kids (ideally breaking the cycle), than moving to project housing and dangerous gang-controlled areas in order to enjoy their "margin of safety". I can't fault them for that.
And, if you're in such a position, and aren't fortunate enough to have your area of expertise and interest involving computers, good luck getting a job without a degree. So what do they do to pay for the outrageous tuition costs these days? Take a giant loan from Sallie Mae.
Now you have two problems.
updog | 15 years ago | on: 90% of Y Combinator Startups Have Already Accepted The $150k Start Fund Offer
updog | 15 years ago | on: Stuxnet Authors Made Several Basic Errors
As someone who has actually read the code, my opinion is that yes it was special, but not because it was brilliant. It took a lot of resources, and although there was clearly a relatively high degree of skill involved for at least parts of it (finding 0days), there were not really any new techniques. So, I personally find it impressive because of the sheer amount of work that went into it.
I think it is more the principal of it that is noteworthy - if someone tried to make a movie plot about that a few years ago, we would have scoffed.
The reason that it was obviously a nation-state is because the number of people that worked on it, the amount of time they spent on it, and what the group would stand to gain (nothing), would not have been funded by any other entity. I won't go so far as to say it would be impossible to do by someone else, but that is improbable and really would not make much sense at all. Combine that with various external clues, and it is really obvious.
updog | 15 years ago | on: How to Identify a Good Perl Programmer
updog | 15 years ago | on: Malware researcher Dancho Danchev gone missing since August
I agree, it is worth looking into until there is real evidence either way. Hopefully he will come forward. Someone on twitter did say they heard from him on Dec 15th and he was fine.
My experience with these "independent security professionals" who are heavy on certification alphabet soup/government acronyms, and lacking in real credible work history, is that they are mostly playing "fake it until you make it". This especially applies to bloggers and those who heavily use terms like "cyber warfare" and "cyber terrorism". InfoSec is full of insecure charlatans who are broke or homeless and always making up outrageous nonsense.
updog | 15 years ago | on: Malware researcher Dancho Danchev gone missing since August
-He claims a particular LEO is after him for pro-western views. This is the hardest hit to his credibility. If he said that botnet authors came after him for outing them, that might be plausible. The Belgian government does not hunt and 'disappear' pro-western people.
-There is no stego in this image like some have suggested. If it was in a letter, there is no data to be read. If it did not come from a latter, it was taken recently, according to the metadata. Also, if he is making direct accusations, he is not hiding information. Either the whole message would be cryptic, or none of it. If he isn't afraid to name the guy, he wouldn't be afraid to plainly state that he found a recording device or whatever else.
-He acts like the image has a smoking gun, and it does not.
-He has never had a real, credible job in the industry. See his LinkedIn: http://nl.linkedin.com/in/danchodanchev It's either blogging, or "secret companies". And astalavista, which was warez/script kid forums and stuff.
-His blog is completely full of "cyber jihad" research and discussion of "cyber terrorist" nonsense. http://ddanchev.blogspot.com/
updog | 15 years ago | on: Malware researcher Dancho Danchev gone missing since August
If I was going to bug someone for a long time, I would not run new wires. I would piggyback off of some other low power device.
He could have gone searching after they removed everything, and looked for something that was spliced.
On the other hand, I would not bug a bathroom. That seems like the worst place to bug.
updog | 15 years ago | on: Malware researcher Dancho Danchev gone missing since August
Perhaps someone at ZDNet re-saved them. If that is the case, they should release the originals.
updog | 15 years ago | on: Root keys for Sony’s PlayStation 3 go public
The only reason that he was able to do anything with his dump was because of all of fail0verflow's work. See the twitter feed of marcan42 for clarification.
Actually, since the beginning, geohot's ps3 trick was just him copying what fail0verflow had done on the wii (glitching the address bus). He didn't give them credit for that either.