Dailydave mailing list archives
Re: Imaginary hacking strategy class.
From: delchi delchi <delchi () gmail com>
Date: Mon, 29 Aug 2011 06:31:47 -0600
1. Social networking systems based on what the general populace believes to be cutting edge technology. Database all traffic, trends , sell advertising, sell data, sell historical data at a higher price point than current data, and mine for everything it is worth. Compile as much information then partake in information swaps with smaller or upcoming social networks. Initially track and trend social structure, then ultimately control and steer it as needed to obtain maximum profitability. Back the effort with a full on commercial barrage of personal equipment utilizing the basic steps of deploying a tech product : 1 - Create an artificial need for the product / service ( advertising, culture, product placement ) 2- Release the product at a price point above what your target audience can afford to support artificial need and encourage early adopters. 3 - Wait approx. 6 months to a year, synchronized with a holiday cycle 4 - Re-release version two of the product at a price point in line with your target audience -- Repeat as needed with new products/services / updates -- use the social network initially created to push your product and to hamper others. Mine data to improve or alter product as needed. Repeat this with multiple products designed to seamlessly interact both through tech and artistic design. With mined information be able to knwo what wil be popular next and/or dictate what will be popular next and tune it to be profitable. Marry this with an ongoing money for nothing scheme ( Think if Facebook owned Zynga ) providing some for of entertainment/fulfillment that mandates real money in , and nothing of worth out. ( Coins, points, tokens, achievements ) 2. Invest profits from step 1 into infrastructure. Ensure that the product cycle in step 1 demands bandwidth , fiber, and advanced routing to ensure speed and deliverability to every corner of the country - then be the company to deliver that service. Buy out the backbone, then become backbone v2. At the end of 5 years the social network created in step 1 will be phased out due to something new coming along / popularity fade - at a proper time dump it and put all money that can be had form it's sale into infrastructure purchasing and advancement. Do not re-create a social network. Continue to produce products that operate on the new infrastructure with exclusivity , locked in contracts, and heavy penalties for non use. 3. With control of infrastructure, ultimately you have control of what goes over the net, how it goes over the net and most importantly IF it goes over the net. At this point ' hacking ' is trivial. All you have to do is sit back and watch the data flow. If done properly even MITM would be trivial as you mandate use of proprietary crypto at different ' levels ' ( Safe, safer, and Oh wow are we safe! ) on the network which will be appropriately designed for data mining. Become the point of contention that all businesses and governments must come to in order to do business. Support both open and clandestine activities to ensure safety and continuation of service without harassment. In all phases of this plan arm yourself with lawyers to enforce contracts, design EULAs to bypass any consumer protection, and expectations of privacy. Drown people in red tape until the urge for popularity and product overcomes common sense. No one gets a cell phone without a 50 page contract that they can see on line if they want to but can just click YES at the store and be bound by. Ensure that any government fees, levies or taxes are directly pushed to the consumer. Counteract any resistance with media placement, entertainment placement, and bread & circus acts of free gear and services. Maintain the product cycle from step 1 for each generation and upgrade of the infrastructure. The devil is in the details, but it's all in how you do it. On Sun, Aug 28, 2011 at 7:53 PM, Dave Aitel <dave.aitel () gmail com> wrote:
In my imaginary hacking strategy class the first essay question is this: 1. What would you build now that would let you hack into what you want to hack into in five years? 2. Ten years from now? 3. Fifty years from now? If you already know what you want to hack into five years from now, you're a rare person, no? -dave _______________________________________________ Dailydave mailing list Dailydave () lists immunityinc com https://lists.immunityinc.com/mailman/listinfo/dailydave
-- "Se li uomini sapessino le cagioni della paura mia, capir potrebbero il mio dolor" _______________________________________________ Dailydave mailing list Dailydave () lists immunityinc com https://lists.immunityinc.com/mailman/listinfo/dailydave
Current thread:
- Imaginary hacking strategy class. Dave Aitel (Aug 28)
- Re: Imaginary hacking strategy class. Don Bailey (Aug 29)
- Message not available
- Re: Imaginary hacking strategy class. Don Bailey (Aug 29)
- Message not available
- Re: Imaginary hacking strategy class. Don Bailey (Aug 29)
- Re: Imaginary hacking strategy class. Andre Gironda (Aug 29)
- Re: Imaginary hacking strategy class. allison nixon (Aug 29)
- Re: Imaginary hacking strategy class. Fabian (Aug 29)
- Re: Imaginary hacking strategy class. Konrads Smelkovs (Aug 29)
- Re: Imaginary hacking strategy class. Richard Thieme (Aug 29)
- Re: Imaginary hacking strategy class. Miles Fidelman (Aug 29)
- Re: Imaginary hacking strategy class. delchi delchi (Aug 29)