I know what Honeypoting is mate, the problem is that the Chinese Hackers and more specifically those hackers who are working for Chinese Government are considered one of the best in the world. How do they can make such a mistake, or they aren't aware of the honeypoting? lol at least I cannot trust the worthiness of this news.
The 2 and a half years (including training) working with Military Intelligence told me this.
NOTHING IS WHAT IT SEEMS ON THE OUTSIDE.
Of course now that I am telling you and your concern is raised, you will think "yeah, this is stupid as this is obviously a bait" But what if it come from somebody you trust?
Human are a pack animal, we do things sometime just because other do it too, or that someone we trust that told us that is safe, the problem is, you never know what is a honeypot or what is not at the first glance of the incident, you may think this is obvious a hack,
but if you go back and reverse your train of through, since nothing is real and you can expect everything is a fake, then why do you need hacker in the first place? Since everything you do, it's always going to expect that was a honey pot.
Are Chinese hacker really that good? No one can tell, you, me, or even PLA can tell you the exact answer, you can hack something, even if you are successful in your hacking, you never know if that is a honey pot or not, and unless the other side (The side that you are hacking into) tell you honestly what did you get, and this is the only thing the other side will never tell you, there are no way you can measure how hacker do in any country.
well firstly theres no such thing as secure data, just data thats hard to get at.
you can have long postioned moles who have access to such servers, or you can find the gateway machines and get the data from there providing its a two way exchange .
as for clearences most people can only see the data and thats no good as you cant take pics as they take any electrical device of you and go through multiple checks before your even allowed to go down the lift.
True. The question is, mole is not at all dependable, you flipped once, you are going to flip twice.
The problem is never about data security, it may sound strange but this is actually the case, the problem is, and always is and always will be, how do you distribute those data. The official term we use is dissimilation
Data security only get you so far to shelter you from some sort of attacks, that is, and almost all of them can be counted by other means (like data farm - mole, or lock - keys and so on). The thing is, it is a lot easier to control how and what kind of data people access, than try to protect it from illegal access altogether. One of the way we discussed in the field is trivialize data you need to be protected, that way each person can only access fraction of the information, and say you and me are working on the same project, the data I can access is useless standalone, as well as yours is useless standalone, it will only make sense when your's and mine's are put together, and that way, even if one of us is a mole from a hostile country, that data either one of us got is useless.
I cannot tell you how this can be done, as A.) This would be highly classified B.) I have been out of the game for so long I am not sure what is going on anymore. But this is how secure data are handled with the US Intelligence circle.
oh as your your first point......... you sound like a politicain... a really bad one
Yeah, that's quite bad isn't it, whenever people say that, you can expect whatever they are talking about is happening right now and this dude just don't want to tell you in detail...