Confessions Of A Nation-State Penetration Tester — Facing Centralized Tech

2021-9-6 18:07

I was a developer and cybersecurity expert for a government-level institution. My responsibilities included various implementations in the area of IT and cybersecurity.

It started with integrating and implementing various technologies such as intrusion detection systems. That is, detecting attacks and tracking down malicious packages in the network in real-time, deducting them, and implementing countermeasures on a physical and routing protocol layer. 

Basically, I worked on everything related to modern (government) technology from a security standpoint. These included threats in cyberspace, like attack scenarios and the attack surfaces which malicious actors might exploit. 

Seeing it all from the inside

I learned a lot about the technologies available to state actors in the field of OpSec.

For example, technologies exist that inject small pieces of data into malicious data packages. Thus, allowing authorities to gather information regarding the source and destination of the package.

With our clearance, we could communicate with various internet service providers and centralized network relay nodes. You would track the malicious packets to the final destination and learn about where it all came from. 

If someone, for example, were hiding behind the virtual private network or various proxy routing protocols, I would track the package on the physical layer. So, we were still able to determine where the package came from. 

We would study man-in-the-middle attacks. We would determine in real-time how we could spy on two connections to understand how malicious actors think and execute attacks.

As part of our duties, we also trained those working in other government departments. These included teaching law enforcement agencies and others about tracking cybercriminals.

Over the years working in the OpSec field, I came to understand a lot about how the world works. I learned there is a cyber war going on.

Threats in cyberspace are growing beyond the rate and scope that countermeasures can be implemented.

No matter how decentralized the software is that we’re using, no matter how huge this peer-to-peer network is, we’d always have to ask ourselves one question: Where is this software running? All too often, blockchain technology—DeFi included—runs on centralized technology.   

The crypto industry faces the existential threat of centralized tech

In the crypto industry, we are still married to centrally controlled infrastructure. We are using government infrastructure, ISP infrastructure, centralized DNS nodes, and providers.

So the technology we create in crypto may very well be decentralized, but, at the end of the day, the underlying physical layer—indeed, the whole base foundation—is pretty centralized.

Unless there’s a real alternative—a second or decentralized internet—the industry faces a problem at the cyber OpSec and DevSec layer. Addressing this shortcoming with a truly decentralized Web3 is of the utmost importance for the future of money.

We’re at the point where there are so many threats and risks in the cyber world that we all must be aware and extra cautious. This is true, even if we keep a low profile online.

The majority of internet users nowadays don’t take OpSec seriously—even people in the crypto industry.

Unless you’ve been a victim of a hack, scam, virus, or worm, you might not even have proper antivirus or basic firewalls set up. These are, admittedly, just the beginning of good operational security. 

Protecting decentralized technology

Indeed, as the cyber wars wage on, the public will become increasingly aware. The future of the modern world depends in some ways on cybersecurity. We must protect privacy and decentralization.

It is abundantly clear that an unsecured physical layer poses an existential threat to any decentralized technology since the users themselves are the network.

Security might seem like an inconvenience, but it is essential. If we are going to share the global Bitcoin network and broader crypto networks, which could one day underpin a future iteration of the web, our own security is part of greater social responsibility.

We must all be willing to learn simple security precautions and implement them in our use of crypto.

The post Confessions Of A Nation-State Penetration Tester — Facing Centralized Tech appeared first on BeInCrypto.

Similar to Notcoin - Blum - Airdrops In 2024

origin »

Jingtum Tech (SWTC) íà Currencies.ru

$ 0.0001411 (-0.01%)
Îáúåì 24H $0
Èçìåíåèÿ 24h: 0.05 %, 7d: -14.03 %
Cåãîäíÿ L: $0.0001411 - H: $0.0001411
Êàïèòàëèçàöèÿ $0 Rank 3615
Äîñòóïíî / Âñåãî 0 SWTC

tech facing confessions tester centralized penetration nation-state

tech facing → Ðåçóëüòàòîâ: 21


Ôîòî:

IBM Blockchain Unit Reportedly Carrying out Reorganization Amid Challenges

Global tech firm IBM has reportedly laid off most of its employees in its blockchain sector, as the company is experiencing challenges with its revenue.  Blockchain Arm Reportedly Facing Employee Exodus According to different sources familiar with the matter, IBM is reportedly carrying out a reorganisation, which has seen the company slashing its blockchain workforce.Read More

2021-2-3 16:00


Ocean Protocol Boosts the Global Data Economy with Millions of Tokens

In order to once and for all tackle the menace facing the global data marketplace, such as network integration and a host of other tech-related issues, Ocean Protocol is setting up a 6-week challenge, that will see a host of hackers, developers, tech talents and enthusiasts come together for the greater good of the industry, […] The post Ocean Protocol Boosts the Global Data Economy with Millions of Tokens appeared first on ZyCrypto.

2019-8-23 13:07


Top Crypto Analyst believes Bitcoin without Satoshi Nakamoto is facing the same fate as Apple without Steve Jobs

Former tech banker and self-proclaimed Bitcoin maximalist Kevin Pham has taken to Twitter to express his thoughts on the current state of the Bitcoin network. Pham’s tweet implied that the Bitcoin network is losing momentum, more precisely, Pham compared the current state of the network to that of America’s top tech company Apple.

2019-3-8 01:00


Encrybit ICO

- ENCRYBIT THE RESEARCH BASED CRYPTOCURRENCY EXCHANGE Encrybit made history moments creating massive surveys in cryptocurrency market with 12k+ responses from traders among 167 countries. Encrybit exchange is thought of traders where we are merging their demands in reality developing the secured and featured enriched trading platform that does not want to compromise the emotions of traders.

2018-11-14 19:41


Ôîòî:

Promoted: The Future of Online Shopping Is Powered by Spl.yt — A Decentralized E-Commerce Protocol

As a rapidly growing business sector, e-commerce continues to open up new avenues for exploring, comparing and purchasing products worldwide. Spl. yt, a smart contract protocol, aims improve the e-commerce system for buyers and sellers by automating functions currently performed by “middlemen” marketplaces like Amazon, eBay and Alibaba.

2018-7-16 19:45