- cross-posted to:
- security@lemmy.ml
- cross-posted to:
- security@lemmy.ml
What are typical follow up? I assume the authorities will trace websites, but beyond that?
I imagine now that they’re aware of the vector of attack they’re going to do some more audits and watch out for this type of attack in the future.
I just wondered if a counterattack would be forthcoming, because you can bet either way, it’s going to be claimed.
Oh I imagine if it is then it won’t be announced.
I’m sure, but leaks seem common in these cases, I just haven’t followed how China deals with them. Stux and flame were all over the news with coding styles distinctly USian and Israeli, so naturally when the USA cried about Iranian intrusion, my thoughts were, “shouldn’t have opened the door.”
Although not familiar with how China deals with such things, I’m obviously watching to see if USA starts talking about Chinese hackers again, and now that I’m thinking about it, that’s possible why USA was in a huwai panic.
The best way to guard against this is to control supply chains domestically. The panic over Huawei could be not only out of fear of it being malicious but the lack of opportunity to inject their own malicious code into the pipeline.
That’s a great point. Thanks, I’m sure to be turning these thoughts in the back of my mind. I haven’t followed anti/sec news in a really long time, but it’s always interesting to consider geopolitical implications when it blips across my radar.



