Proper Planning and Preparation Prevents Piss Poor Penetrations I was asked for good references on pre-operation phases of hacking. I recommended Matt Monte’s “network attacks and exploitation: a framework”, and Bill McRaven’s “Spec Ops: Case Studies in Special Operations Warfare: Theory and Practice”. The Monte book is the best book on cyber written so far. […]
The WeChat Ban and National Cyber Strategy
NOTE: The ban on WeChat was blocked for violating freedom of speech. For the millions of Chinese in the diaspora Trump’s WeChat ban has created a problem only the software grey market can solve. WeChat is almost an existential requirement. It’s the only messaging app the Chinese Communist Party (CCP) allows, making it the only […]
Zoom + Keybase
There is an opportunity here to signal that Zoom is not a Chinese asset. Zoom can effectively remove itself from the board by completely mitigating passive surveillance. When no state’s intelligence agency benefits from a home field advantage with Zoom, then its value as a strategic cyber asset is massively reduced. If Zoom eliminates the […]