Reading log.
Jun. 12th, 2018 10:37 pmStill in the middle of Halting State by Charlie Stross, written in 2008, and set in 2018. It's cute in all sorts of ways. (Scotland is out of the UK, kind of, but the UK is still in the EU, and so the bureaucratiic infighting is of the kind to give a science fiction author all the plot bunnies he needs to get a story going.) THe cutest detail is people using IRDA to exchange contact details between their phones. It makes me want to dig out my Palm III.
I'm also strugging to get through a big pile of PDFs, and one I think y'all might enjoy reading is To Kill A Centrifuge about the Stuxnet implant.
The important pull quote:
The minority (including this author) believes that basing national security on theories about adversaries’ motivations and wishful thinking on how to control them is a risky gamble. It advocates work ing towards effective passive defense “just in case” , making substantial cyber - physical attacks against critical infras tructure if not impossible, much more difficult, and certainly difficult enough to put them out of reach f or non - state actors.
Such is a goal that is realistically achievable for those willing to accept the challenge presented by Stuxnet to start over and find and implement new and creative defensive solutions that render cyber weapons pretty much useless.
I'm also strugging to get through a big pile of PDFs, and one I think y'all might enjoy reading is To Kill A Centrifuge about the Stuxnet implant.
The important pull quote:
The minority (including this author) believes that basing national security on theories about adversaries’ motivations and wishful thinking on how to control them is a risky gamble. It advocates work ing towards effective passive defense “just in case” , making substantial cyber - physical attacks against critical infras tructure if not impossible, much more difficult, and certainly difficult enough to put them out of reach f or non - state actors.
Such is a goal that is realistically achievable for those willing to accept the challenge presented by Stuxnet to start over and find and implement new and creative defensive solutions that render cyber weapons pretty much useless.