Blog powered by Typepad

« I'm moving to Kennesaw, Georgia | Main | Your Monday Funnies: 12.3.18 »

Sunday, 11 March 2018

Comments

Feed You can follow this conversation by subscribing to the comment feed for this post.

David, that is better than down to the "Seventh Circle"!

If you can't read, take a peak at a couple of maps to put yourself in the picture ...

http://www.currenteventspoland.com/images/analysis/nord-stream/nord-stream.jpg

https://ipfs.io/ipfs/QmXoypizjW3WknFiJnKLwHCnL72vedxjQkDDP1mXWo6uco/I/m/Nazi-Soviet_1941.png

SoD

SoD,

A picture being worth 1000 words, you have a very good idea:

http://www.visualcapitalist.com/watch-cyberwar-live-map/

https://defensesystems.com/articles/2014/06/26/cyber-attack-real-time-maps.aspx

Bob,

The sentiment of those maps is right, but the detail is dodgy.

Anyone doing a cyber attack will go through the dark web and not be traceable or use hijacked devices which will finger the wrong state as the origin.

For example, the attacker list is streaming away showing Microsoft attacks! I don't think Redmond would be so dumb as to directly attack anyone, with or without the dark web or a hijacked machine to cover their tracks.

I wonder why MS aren't concerned about that map. It's rather slanderous, really.

SoD

SoD,

It's not difficult to identify entrances and exits for the dark web, nor to identify and trace beyond other net sharing devices. You're probably right about hijacked computers, and it's difficult to interpret the maps though they're interesting all the same. Maybe some of the activity between MS and others is to develop and neutralize attack methods.

The comments to this entry are closed.