› Forums › Personal Topics › Unbidden Thoughts › Denial Of Service & Game Theory In Reality
This topic contains 3 replies, has 1 voice, and was last updated by
josh October 9, 2022 at 10:33 am.
-
AuthorPosts
-
October 9, 2022 at 12:31 am #123528

joshAlbert Pujols and Yadier Molina both got hits in their final at-bats https://t.co/u7e502UhoU
— Sports Illustrated (@SInow) October 9, 2022
-
October 9, 2022 at 10:02 am #123532

joshThe tweet above was an instant response from IT editing, included for humor & example demo.
So, in reality, information security is broken by the context of being born & waking up as a kind of prisoner in a death camp run by totalitarian spy militaries which conquered what academically minded people would call civilization long before our biological parents who we never met were born.
One kind of worthy project I have repeatedly endorsed is trying to efficiently & economically rebuild classical info security based around using existing gear in extra careful ways while new gear/networks are being securely built (mfg. anything as an indy, without backdoors, is a cold war). For example, crypto can be designed so that secret keys are not practically viewable by anyone and biometrics can be implemented to alert us when id changes have occurred without comment, etc. People can be taught to use networks in this way & get real info & entertainment at the same time, while they are on the go. The IC/neural links have been implemented in insecure ways that use both public utility lines & military service stations. GT has demonstarted a rapid rate of improvement in tech, but implementation of long range service via Internet routes & install of locally secure wireless devices has been delayed by the now familiar mfg. & organization & communication & freedom from EE kill terrorism issues. EE kill terrorism can be “easily” attacked in its recent generation forms by tech that requires light mfg. & distribution & sometimes installation (e.g. electrical service panel adjustments) and cable wiring adjustments. In the future, civilization quickly faces a rapid increase in terror from dwelling penetrating micro/nano attack droids. Bot defense is seemingly required to battle these along with some forms of sewer invasion droids.
In many situations psychological models of interaction are more practical & helpful than formal modeling. Pscyhologists classically talk about the 3 F’s (join, flee, or fight) as a rough classification of interactivity states. To an ever increasing degree, the modern military mafia is attacking most types of humans & forcing them to flee or fight without any true possibility of joining. Among those offered a possibility of joining, they are forced to choose between continually either fighting some designated target group (always a moving frontier to declare new target groups as sub-human for plunder & sadistic play) or fleeing & being targeted themselves. The military system is designed to limit informative communication about reality & marshal many troops based on false stories about who they are fighting & whether they are actually part of a join group. As a target, one receives heavy surveillance by design. One of the priorities is to prevent sharing of information. In a sense, every bit of info you emit – even to the empty walls of your shelter – is a kind of action play that creates a response in surveillance. Some join, & some become targets by their own choice & some become instant targets by the choice of others – and this repeats endlessly. The dominant cold war military strategy of the forces running civilization is a combination of information ghettoization, totalitarian control of all channels, & cyber directed EE/robotic kill of all targets of interest.
The playing field of what is possible in opposition is very rich, but often uncomfortable & involves moving & operating in non-traditional & unfamiliar ways.
-
October 9, 2022 at 10:33 am #123533

joshPractice has shown that GT faces constant surveillance & cold war attacks. Key goals of surveillance include assessment of which individuals & resources carry the most load for key GT operations. This info is used to schedule assault & denial of service attacks of varying sorts. Organized response needs to do a better job of anticipating that, defending key resources, & scheduling automatic continuity of key services when the resources formerly operating them are no longer functioning adquately in that capacity for whatever reason. In most cases, the reason is having their communication services blocked by IT means, sabotage, & sometimes local men pointing guns. Extracting the valuable offline contirubutor from their latest predicament should be part of the rollover plan that happens automatically. In general, planning on using any switched IT resources that is owned by non-GT (or owned by GT but not actively inspected for secure performance) in service of key operations is a trigger for likely failure or compromise of that resource. It just happens. That’s the kind of thing the FBI is expert at doing in service of their secret mafia empire. Redunancy of methods, detection of failure, and alternate routing are key.
-
AuthorPosts
You must be logged in to reply to this topic.