bontchev ,
@bontchev@infosec.exchange avatar

This article is absolute nonsense:

"Google: Stop Burning Counterterrorism Operations":

https://poppopret.org/2024/06/24/google-stop-burning-counterterrorism-operations/

My arguments:

  • The job of the security researchers is to find security flaws, attackers exploiting them, etc.

  • The job of the spies to the spy.

  • The job of those doing counter-terrorism is to fight terrorists.

Do your job and stop complaining about the other people who are doing their job.

UncivilServant ,
@UncivilServant@med-mastodon.com avatar

@bontchev Oh lord, that gave me flashbacks to the debates in the 90s over whether we should have funded right-wing death squads in Latin America to fight communists.

Basically it was the same argument: screw morality, there are bad guys out there so we have to be willing to be worse.

My response is always the same: and when the devil turns round on you, where will you hide, the laws all being flat?

ntzm ,
@ntzm@hachyderm.io avatar

@bontchev It's such a ridiculous simplification, and it can be shown by the fact that the only examples they give are counter-terrorism. The assumption that the west are always the good guys, and their opponents are always the bad guys.

wdormann ,
@wdormann@infosec.exchange avatar

@bontchev
It also conveys: "I'm definitely the only person in the universe who knows about this bug now, and until the end of time."

video/mp4

nfreader ,
@nfreader@mastodon.social avatar

@bontchev and our personal devices are not the battlefield of states.

Bartmoss_h4x0r ,
@Bartmoss_h4x0r@corteximplant.com avatar

@bontchev The author unironically uses the word "Cyber". Opinion immediately discredited.

Also, yes, spies complaining about failing at their job is hilarious

Sturmflut ,
@Sturmflut@mastodon.social avatar

@bontchev I fully agree. If Google could just walk in and take the exploits, where is the proof that other threat actors hadn't done the same and were already using those exploits against somebody? The spies most likely bought the exploits from someone, where is the proof that some threat actor hadn't also done so?

kyhwana ,
@kyhwana@furry.nz avatar

@bontchev obviously the only solution is for everyone in blue team cyber in the entire world to stop doing their jobs /s

vadhakara ,
@vadhakara@mastodon.social avatar

@bontchev If the nation state didn't want their exploits exposed, they should have hidden them better.

Euph0r14 ,
@Euph0r14@infosec.exchange avatar

@bontchev One man’s “Counter Terrorism” Zeroday, is another man’s “Hack and Kill opposition” Zeroday

Also Rip Sophia :(

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • test
  • worldmews
  • mews
  • All magazines