this post was submitted on 01 Feb 2024
319 points (93.5% liked)
Technology
59377 readers
4098 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Manually attacking your adversary is so 1900s. Train a MASSIVE ai on every classified hacking methodology/procedure document in existence, give it the adversary's IP ?range, and press GO.
Hacking is too complex to be automated like that - for now at least. Especially the AI buzzword is useless in this context. There are a lot of attempts to automate the process, but none of them come close to manual review by an experienced professional.
Even if only one in a million succeed, it's still able to try those million damn fast. And it's only going to get better logarithmically.
That would just cause chaos. Which might benefit the attacker but I think you’d be better off with smaller targeted strikes using the secret catalog of CIA/NSA hacking tools already available to them. Or I suppose why not do both.