Unconventional Adversaries vs. Conventional Wisdom (Video) 21
This presentation was given by Joshua Corman at CodenomiCON 2012 in Las Vegas, an invitation-only security mini-conference sponsored by the pen-testing company Codenomicon that ran concurrently with Black Hat USA 2012. Josh is Director, Security Intelligence, for Akamai, and is one of the instigators of Rugged Software. He sympathizes with Anonymous more than with corporate or government forces that are determined to bring order to everything, including the Internet, on their terms. We have no transcript for this video since we only have permission to embed it, not to alter or add to it. But it's well worth watching, including the accompanying slides. And if Joshua Corman is speaking anywhere near you, it's well worth your time to go see him.
shitty write-up (Score:2, Informative)
Direct link to the video [youtube.com].
Re: (Score:2)
Thanks for adding value. :-/
I like this talk. I thought I might be the only security professional who hadn't been co-opted by a purely statist, law-enforcement mind-set. Blow it out your "fusion center"! :-)
Re: (Score:1)
WTF? (Score:5, Insightful)
"We have no transcript for this video since we only have permission to embed it, not to alter or add to it." So don't alter it -- transcribe it!
Re: (Score:3)
Yes, but throwing your hands up in the air and declaring yourself incompetent is so much easier though.
Btw, have they ever included a transcript for video submissions? I know I have bitched about it on many occasions.
Re: (Score:2)
Bollocks.You don't need "permission" to describe something in a news story. If they want to give you a hard time, tell them to fuck off and promote their video somewhere else.
Re: (Score:3)
TL;DW
It's your loss
Terrible summary (Score:2)
This is a terribly written summary! What's the video about? The only sentence that tells is the middle one, and it is vague. Here is a rewritten summary, putting facts in the order that a reader needs to know them:
Order should not be brought to the Internet, said Josh Corman, Director of Security Intelligence at Akamai, in this talk at CodenomiCON 2012, in Las Vegas. (Transcript unavailable, due to licensing.)
That's the best I can do based on the facts in the summary. I could watch the video and come up with a better one, but I'm not sure it's worth 20 minutes of my time.
Re: (Score:2)
Re:What's the video about? (Score:2)
It's about two new classes of security threats, Anonymous and "Persistent Adversaries" aka government sponsored attacks.
There's a nice point in the middle that if you and your buddy are being chased by a bear, you only have to be faster than your buddy. Not anymore. Now there's lots of bears, you're drenched in bacon fat, you poked a few bears in the eye to piss them off, and you only have one decoy buddy. Oops.
Transcript, motherfucker. Do you speak it? (Score:1)
We have no transcript for this video since we only have permission to embed it, not to alter or add to it.
Then what good are you?
I watched it, I'm picky-it was well worth my time (Score:5, Informative)
I wanted to wait for some feedback here before watching this, but after actually going to the (fora.tv) URL I realized that I had watched this exact video only two hours ago, before seeing it on /.
Let me just say that if you like the stuff on fora.tv, especially from Long Now, than this video will be worth your time. The presenter is witty, the arguments make sense, and it is overall a pretty good presentation both in content and in style (HOW is it presented).
It is well balanced (not Fox News style :-) ), not crazy one-sided, and mostly about possible developments and dangers in where IT is going: who owns stuff, who has control? An example which already happened, there was an automated garage and since there was a dispute ab out payments between the makers of that garage and the owner by remote-control they shut down the garage, taking 300 cars hostage. In that context, there will be more and more implants with embedded IT inside YOUR body, from pace makers to other stuff. The video is MUCH MUCH better than my pityful summary though :)
Re: (Score:2)
> Whatever third parties are "taken hostage" in that process are the defaulting buyer's problem.
What you fail to take into account that it is also -and foremost - the "hostages" problem!
I can see that you ignore this tiny little issue - as long as YOU don't end up in that position. Somehow your point of view seems somewhat tilted to one side. I guess such thinking stems from business and economics courses, where other people are nothing but "resources" and "human capital", so it becomes very easy to abs