Manually attacking your adversary is so 1900s. Train a MASSIVE ai on every classified hacking methodology/procedure document in existence, give it the adversary’s IP ?range, and press GO.
That would just cause chaos. Which might benefit the attacker but I think you’d be better off with smaller targeted strikes using the secret catalog of CIA/NSA hacking tools already available to them. Or I suppose why not do both.
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: !technology@lemmy.world
This is a most excellent place for technology news and articles.
Manually attacking your adversary is so 1900s. Train a MASSIVE ai on every classified hacking methodology/procedure document in existence, give it the adversary’s IP ?range, and press GO.
That would just cause chaos. Which might benefit the attacker but I think you’d be better off with smaller targeted strikes using the secret catalog of CIA/NSA hacking tools already available to them. Or I suppose why not do both.