Dailydave mailing list archives

Re: Imaginary hacking strategy class.


From: delchi delchi <delchi () gmail com>
Date: Mon, 29 Aug 2011 06:31:47 -0600

1. Social networking systems based on what the general populace
believes to be  cutting edge technology. Database all traffic, trends
, sell advertising, sell data, sell historical data at a higher price
point than current data, and mine for everything it is worth. Compile
as much information then partake in information swaps with smaller  or
upcoming social networks. Initially track and trend social structure,
then ultimately control and steer it as needed to obtain maximum
profitability.

Back the effort with a full on commercial barrage of personal
equipment utilizing the basic  steps of deploying a tech product :

 1 - Create an artificial need for the product / service (
advertising, culture, product placement )
 2-  Release the product at a price point above what your target
audience can afford to support artificial need and encourage early
adopters.
 3 - Wait approx. 6 months to a year, synchronized with a holiday cycle
 4 - Re-release version two of the product at a price point in line
with your target audience

-- Repeat as needed with new products/services / updates -- use the
social network initially created to push your product and to hamper
others. Mine data to improve or alter product as needed. Repeat this
with multiple products designed to seamlessly interact both through
tech and artistic design. With mined information be able to knwo what
wil be popular next and/or dictate what will be popular next and tune
it to be profitable.

Marry this with an ongoing money for nothing scheme ( Think if
Facebook owned Zynga ) providing some for of entertainment/fulfillment
that mandates real money in , and nothing of worth out. ( Coins,
points, tokens, achievements )

2. Invest profits from step 1 into infrastructure. Ensure that the
product cycle in step 1 demands bandwidth , fiber, and advanced
routing to ensure speed and deliverability to every corner of the
country - then be the company to deliver that service. Buy out the
backbone, then become backbone v2. At the end of 5 years the social
network created in step 1 will be phased out due to something new
coming along / popularity fade - at a proper time dump it and put all
money that can be had form it's sale into infrastructure purchasing
and advancement. Do not re-create a social network. Continue to
produce products that operate on the new infrastructure with
exclusivity , locked in contracts, and heavy penalties for non use.

3. With control of infrastructure, ultimately you have control of what
goes over the net, how it goes over the net and most importantly IF it
goes over the net. At this point ' hacking ' is trivial. All you have
to do is sit back and watch the data flow. If done properly even MITM
would be trivial as you mandate use of proprietary crypto at different
' levels ' ( Safe, safer, and Oh wow are we safe! )  on the network
which will be appropriately designed for data mining. Become the point
of contention that all businesses and governments must come to in
order to do business. Support both open and clandestine activities to
ensure safety and continuation of service without harassment.

In all phases of this plan arm yourself with lawyers to enforce
contracts, design EULAs to bypass any consumer protection, and
expectations of privacy. Drown people in red tape until the urge for
popularity and product overcomes common sense. No one gets a cell
phone without a 50 page contract that they can see on line if they
want to but can just click YES at the store and be bound by. Ensure
that any government fees, levies or taxes are directly pushed to the
consumer. Counteract any resistance with media placement,
entertainment placement, and bread & circus acts of free gear and
services. Maintain the product cycle from step 1 for each generation
and upgrade of the infrastructure.

The devil is in the details, but it's all in how you do it.


On Sun, Aug 28, 2011 at 7:53 PM, Dave Aitel <dave.aitel () gmail com> wrote:
In my imaginary hacking strategy class the first essay question is this:
1. What would you build now that would let you hack into what you want to
hack into in five years?
2. Ten years from now?
3. Fifty years from now?
If you already know what you want to hack into five years from now, you're a
rare person, no?
-dave

_______________________________________________
Dailydave mailing list
Dailydave () lists immunityinc com
https://lists.immunityinc.com/mailman/listinfo/dailydave





-- 
"Se li uomini sapessino le cagioni della paura mia, capir potrebbero
il mio dolor"
_______________________________________________
Dailydave mailing list
Dailydave () lists immunityinc com
https://lists.immunityinc.com/mailman/listinfo/dailydave


Current thread: