Changes To Project Risks
Not logged in

Changes to "Project Risks" between 2016-07-04 21:52:59 and 2016-08-08 15:26:55

    12     12   Tor to be banned. Games can reroute their updates through Skype and the
    13     13   "license" of the Skype P2P protocol requires Skype to apply state censorship to
    14     14   whatever is being routed through Skype.)</i></div>
    15     15   
    16     16   <div><br>
    17     17   </div>
    18     18   
    19         -<div><b>Countermeasures: create private physical networks that do not depend on
    20         -traditional Internet Service Providers (ISP-s). As those will also probably be
    21         -outlawed or bugged by law, just like the 2016 traditional ISP-s are bugged, the
    22         -private physical networks have to be made very mobile and dynamic, so that they
    23         -can quickly launch and disappear "without a trace" and the connectivity is
    24         -provided by a probabilistic connection. The more private networks there are,
    25         -the greater the uptime of the probabilistic connection. Steganography might
    26         -also work, until the steganography counter-measures reduce the service quality
    27         -of various channels like the copyright law has reduced the service quality of
    28         -many 2016 online applications.</b><br>
           19  +<div><b>Countermeasures: </b><font color="#008000">create private physical
           20  +networks that do not depend on traditional Internet Service Providers (ISP-s).
           21  +As those will also probably be outlawed or bugged by law, just like the 2016
           22  +traditional ISP-s are bugged, the private physical networks have to be made
           23  +very mobile and dynamic, so that they can quickly launch and disappear "without
           24  +a trace" and the connectivity is provided by a probabilistic connection. The
           25  +more private networks there are, the greater the uptime of the probabilistic
           26  +connection. Steganography might also work, until the steganography
           27  +counter-measures reduce the service quality of various channels like the
           28  +copyright law has reduced the service quality of many 2016 online applications.</font><br>
    29     29   </div>
    30     30   
    31     31   <div><br>
    32     32   </div>
    33     33   
    34     34   <div><br>
    35     35   </div>
................................................................................
    38     38   
    39     39   <div>Computers of developers are compromised, so that the project deliverables
    40     40   contain malware or the project deliverables lack proper security measures.&nbsp;</div>
    41     41   
    42     42   <div><br>
    43     43   </div>
    44     44   
    45         -<div><b>Countermeasures: have backup copies at different machines, diff the
    46         -different backups and try to use the classical intrusion countermeasures.</b></div></div>
           45  +<div><b>Countermeasures:</b><font color="#008000"> have backup copies at
           46  +different machines, diff the different backups and try to use the classical
           47  +intrusion countermeasures.</font></div></div>
    47     48   
    48     49   <div><b><br>
    49     50   </b></div>
    50     51   
    51     52   <div>
    52     53   
    53     54   <div><br>
................................................................................
    56     57   <div>Developers get killed or tortured by the CIA or other agencies of various
    57     58   supermafias. <i>(It does not even matter, if they do it secretly or &nbsp;totally
    58     59   publicly, because the mobs just could not care less.)</i></div>
    59     60   
    60     61   <div><br>
    61     62   </div>
    62     63   
    63         -<div><b>Countermeasures are missing.</b> Usually the super-mafiosi, the
    64         -professional politicians, do not care about civil liberties or human rights, as
    65         -long as their salary is good and job secure and their job will always be
    66         -secure, because in Democracy the one with the greatest campaign budget wins.
    67         -However, there is a limit that the number of people working in the various
    68         -supermafia security agencies is a minority, which sets a limit, how much other
    69         -people they are able to kidnap and torture. Slaughterhouses for successfully
    70         -killing hens, chickens, have been developed by private sector, but an automated
    71         -torturing line, where people are tortured by robots like cars are manufactured
    72         -in car factories assumes an IT project and it takes a bit of preparation to get
    73         -it done and tested, so may be there could be some cooperation with private
    74         -security firms, who would mount a sabotage attack on the torture line and plain
    75         -physically blow up the equipment at the torturing plant. Most likely
    76         -countermeasures that can be retroactively applied is to mount an assassination
    77         -attack against the torturers/kidnappers and the political chain of command
    78         -that, if not ordered, then at least allowed it to happen out of neglect. <i>(The
    79         -purpose of the assassination attack is not retaliation, but temporary
    80         -disruption of enemy operations, like with bacteria, where the infection causing
    81         -bacteria are never removed totally from the blood stream, but their amount is
    82         -kept at a managable level. Preparations include good overview of the potential
    83         -adversaries, id est intelligence gathering must be done in advance, during
    84         -piece time.)</i>&nbsp;<font color="#ff0000">If You think that this text here is
    85         -a stretch, then please, please do try to remember, what other cases from the 2.
    86         -World War and later history sounded like a stretch at first glance, but ended
    87         -up being perfectly true.</font></div>
           64  +<div><b>Countermeasures are missing.</b> <font color="#008000">Usually the
           65  +super-mafiosi, the professional politicians, do not care about civil liberties
           66  +or human rights, as long as their salary is good and job secure and their job
           67  +will always be secure, because in Democracy the one with the greatest campaign
           68  +budget wins. However, there is a limit that the number of people working in the
           69  +various supermafia security agencies is a minority, which sets a limit, how
           70  +much other people they are able to kidnap and torture. Slaughterhouses for
           71  +successfully killing hens, chickens, have been developed by private sector, but
           72  +an automated torturing line, where people are tortured by robots like cars are
           73  +manufactured in car factories assumes an IT project and it takes a bit of
           74  +preparation to get it done and tested, so may be there could be some
           75  +cooperation with private security firms, who would mount a sabotage attack on
           76  +the torture line and plain physically blow up the equipment at the torturing
           77  +plant. Most likely countermeasures that can be retroactively applied is to
           78  +mount an assassination attack against the torturers/kidnappers and the
           79  +political chain of command that, if not ordered, then at least allowed it to
           80  +happen out of neglect. <i>(The purpose of the assassination attack is not
           81  +retaliation, but temporary disruption of enemy operations, like with bacteria,
           82  +where the infection causing bacteria are never removed totally from the blood
           83  +stream, but their amount is kept at a managable level. Preparations include
           84  +good overview of the potential adversaries, id est intelligence gathering must
           85  +be done in advance, during piece time.)</i></font>&nbsp;<font color="#ff0000">If
           86  +You think that this text here is a stretch, then please, please do try to
           87  +remember, what other cases from the 2. World War and later history sounded like
           88  +a stretch at first glance, but ended up being perfectly true.</font></div>
    88     89   
    89     90   <div><br>
    90     91   </div>
    91     92   
    92     93   <div><br>
    93     94   </div>
    94     95