Blog powered by Typepad

« I'm moving to Kennesaw, Georgia | Main | Your Monday Funnies: 12.3.18 »

Sunday, 11 March 2018


Feed You can follow this conversation by subscribing to the comment feed for this post.

David, that is better than down to the "Seventh Circle"!

If you can't read, take a peak at a couple of maps to put yourself in the picture ...



A picture being worth 1000 words, you have a very good idea:


The sentiment of those maps is right, but the detail is dodgy.

Anyone doing a cyber attack will go through the dark web and not be traceable or use hijacked devices which will finger the wrong state as the origin.

For example, the attacker list is streaming away showing Microsoft attacks! I don't think Redmond would be so dumb as to directly attack anyone, with or without the dark web or a hijacked machine to cover their tracks.

I wonder why MS aren't concerned about that map. It's rather slanderous, really.



It's not difficult to identify entrances and exits for the dark web, nor to identify and trace beyond other net sharing devices. You're probably right about hijacked computers, and it's difficult to interpret the maps though they're interesting all the same. Maybe some of the activity between MS and others is to develop and neutralize attack methods.

Verify your Comment

Previewing your Comment

This is only a preview. Your comment has not yet been posted.

Your comment could not be posted. Error type:
Your comment has been posted. Post another comment

The letters and numbers you entered did not match the image. Please try again.

As a final step before posting your comment, enter the letters and numbers you see in the image below. This prevents automated programs from posting comments.

Having trouble reading this image? View an alternate.


Post a comment

Your Information

(Name is required. Email address will not be displayed with the comment.)