Artifact Content
Not logged in

Artifact 64cb793482f6762d4b4c98d1f46bb9df21d9f006:

Wiki page [Project Risks] by martin_vahi on 2016-06-10 02:37:30.
D 2016-06-10T02:37:30.647
L Project\sRisks
P aadc69eb659008bb290a2808d36953f8d168fd62
U martin_vahi
W 2684
<p></p>

<div><br>
</div>

<div>

<div>Computers of developers are compromised, so that the project deliverables
contain malware or the project deliverables lack proper security measures.&nbsp;</div>

<div><br>
</div>

<div><b>Countermeasures: have backup copies at different machines, diff the
different backups and try to use the classical intrusion countermeasures.</b></div></div>

<div><b><br>
</b></div>

<div>

<div><br>
</div>

<div>Developers get killed or tortured by the CIA or other agencies of various
supermafias. <i>(It does not even matter, if they do it secretly or &nbsp;totally
publicly, because the mobs just could not care less.)</i></div>

<div><br>
</div>

<div><b>Countermeasures are missing.</b> Usually the super-mafiosi, the
professional politicians, do not care about civil liberties or human rights, as
long as their salary is good and job secure and their job will always be
secure, because in Democracy the one with the greatest campaign budget wins.
However, there is a limit that the number of people working in the various
supermafia security agencies is a minority, which sets a limit, how much other
people they are able to kidnap and torture. Slaughterhouses for successfully
killing hens, chickens, have been developed by private sector, but an automated
torturing line, where people are tortured by robots like cars are manufactured
in car factories assumes an IT project and it takes a bit of preparation to get
it done and tested, so may be there could be some cooperation with private
security firms, who would mount a sabotage attack on the torture line and plain
physically blow up the equipment at the torturing plant. Most likely
countermeasures that can be retroactively applied is to mount an assassination
attack against the torturers/kidnappers and the political chain of command
that, if not ordered, then at least allowed it to happen out of neglect.&nbsp;<font color="#ff0000">If
You think that this text here is a stretch, then please, please do try to
remember, what other cases from the 2. World War and later history sounded like
a stretch at first glance, but ended up being perfectly true.</font></div>

<div><br>
</div>

<div><br>
</div>

<div>Developers of censorship free communication tools are hunted down like
weapons manufacturers and drug dealers. (Think of China, Soviet Union, etc.)&nbsp;</div>

<div><br>
</div>

<div><b>Countermeasures: legislation is always slower than technology
development, so the infrastructure must be completed and distributed before its
distribution and development becomes illegal.<br>
 </b></div>

<div><br>
</div>

<div style="font-weight: bold;"><br>
</div></div>
<ul>
</ul>

<p></p>

Z fc2f609fc55dbef9b0384d2f9d45da79