Back to Results

HOUSE_OVERSIGHT_018342.jpg

Source: HOUSE_OVERSIGHT  •  other  •  Size: 0.0 KB  •  OCR Confidence: 85.0%
Download Original Image

Extracted Text (OCR)

me of an old puzzle of Chinese history: Why were the very strongest dynasties - the Han, the Ming, the Tang - always confronted by the best organized, most deadly rebels? The answer was rooted in a violent, greedy tango of the development of each side. The better a dynasty defended its farmers or its trade or its annual rice harvest, the more the rebels from the steppe had to become strategic and unified and powerful. When it was easy to pick off single farmers, then the rebels had no need to be well organized. They could be a bit lazy. Could snatch a year’s undefended harvest in an afternoon. But the stronger the empire, the stronger the rebels had to become5?. Amsterdam in 1994 was a bunch of lone, weak, unprepared farmers. Twenty years later we have a digital empire, and the attackers it deserves are appearing, refined and evolved by this same competitive logic. They are better organized, smart, intent on getting to the heart of the black boxes of power. And the more we defend against them? The better they will become. That our most essential systems are vulnerable to loss of control is a chilly feeling. It is areminder of the power of the people who know how to crash and manipulate - or build and operate - parts of our world most of us barely understand. It’s like discovering someone could take over your lungs or your heart. We don’t understand those devices either, most of us. But we depend on them entirely. Some of these hackers are moved to mischief by technical beauty. Some by the giddy smashing rush of breaking in, of touching the core. Others by greed or patriotism or by secret, zealous, unlawful obsessions. What the technically best of this group share, however, is a pressing desire to get as close as possible to the kernels where inarguable and even invisible code decisions are made, where digital DNA is printed in a sense, and where a total mastery of the binary guts of the system is possible. That Cap’n Crunch thrill, the dream of whistling up control over the thick, helpless trunk of a network, that remains the dream. Remember Conway’s Law: The design and activity and control of a network redounds on, even determines the real world. If the whole network is, in a sense, filled with holes, if it contains inherently the possibility of being turned into a “weird machine” - what does that mean for the real world? The Seventh Sense insight of this chapter, the key feeling, is that all the systems we rely on, that we think we control - financial or political or digital - can all be made weird and pwned by forces we cannot see and struggle to stop. Our markets, our elections, our knowledge - all of these, dependent on linked systems themselves, can become weird. We can no longer regard them as certain and harmless. The hacker’s drive to get to the kernels is not merely an information technology problem. It’s a larger statement about networks, about the way that power and danger are still and always one and the same. The desire to hack the cores of our world is a marker of just how profoundly, even secretly influential the kernels have become - in ways we're just now beginning to understand. Bratus was right, that we don’t really understand any system until it’s been exploited, pwned. This is as true Computing and 2013 IEEE 10th International Conference on Autonomic & Trusted Computing 159 But the stronger the empire: See Turchin, p. 3 110 HOUSE_OVERSIGHT_018342

Document Preview

HOUSE_OVERSIGHT_018342.jpg

Click to view full size

Document Details

Filename HOUSE_OVERSIGHT_018342.jpg
File Size 0.0 KB
OCR Confidence 85.0%
Has Readable Text Yes
Text Length 3,436 characters
Indexed 2026-02-04T16:34:48.375787

Related Documents

Documents connected by shared names, same document type, or nearby in the archive.

Ask the Files