Artifact Content
Not logged in

Artifact e4cf82e1fb22655b96a39c7f475047f6ffca509d:

Wiki page [Project Risks] by martin_vahi on 2016-06-10 02:39:43.
D 2016-06-10T02:39:43.139
L Project\sRisks
P 64cb793482f6762d4b4c98d1f46bb9df21d9f006
U martin_vahi
W 2952
<p></p>

<div><br>
</div>

<div>

<div>Computers of developers are compromised, so that the project deliverables
contain malware or the project deliverables lack proper security measures.&nbsp;</div>

<div><br>
</div>

<div><b>Countermeasures: have backup copies at different machines, diff the
different backups and try to use the classical intrusion countermeasures.</b></div></div>

<div><b><br>
</b></div>

<div>

<div><br>
</div>

<div>Developers get killed or tortured by the CIA or other agencies of various
supermafias. <i>(It does not even matter, if they do it secretly or &nbsp;totally
publicly, because the mobs just could not care less.)</i></div>

<div><br>
</div>

<div><b>Countermeasures are missing.</b> Usually the super-mafiosi, the
professional politicians, do not care about civil liberties or human rights, as
long as their salary is good and job secure and their job will always be
secure, because in Democracy the one with the greatest campaign budget wins.
However, there is a limit that the number of people working in the various
supermafia security agencies is a minority, which sets a limit, how much other
people they are able to kidnap and torture. Slaughterhouses for successfully
killing hens, chickens, have been developed by private sector, but an automated
torturing line, where people are tortured by robots like cars are manufactured
in car factories assumes an IT project and it takes a bit of preparation to get
it done and tested, so may be there could be some cooperation with private
security firms, who would mount a sabotage attack on the torture line and plain
physically blow up the equipment at the torturing plant. Most likely
countermeasures that can be retroactively applied is to mount an assassination
attack against the torturers/kidnappers and the political chain of command
that, if not ordered, then at least allowed it to happen out of neglect. <i>(The
purpose of the assassination attack is not retaliation, but temporary
disruption of enemy operations, like with bacteria, where the infection causing
bacteria are never removed totally from the blood stream, but their amount is
kept at a managable level.)</i>&nbsp;<font color="#ff0000">If You think that
this text here is a stretch, then please, please do try to remember, what other
cases from the 2. World War and later history sounded like a stretch at first
glance, but ended up being perfectly true.</font></div>

<div><br>
</div>

<div><br>
</div>

<div>Developers of censorship free communication tools are hunted down like
weapons manufacturers and drug dealers. (Think of China, Soviet Union, etc.)&nbsp;</div>

<div><br>
</div>

<div><b>Countermeasures: legislation is always slower than technology
development, so the infrastructure must be completed and distributed before its
distribution and development becomes illegal.<br>
 </b></div>

<div><br>
</div>

<div style="font-weight: bold;"><br>
</div></div>
<ul>
</ul>

<p></p>

Z de0bd4cd22adbe96f400de86c93d7ff3