BrianKrebs on Nostr: I don't mind getting hired to scare people, because a) it's not very hard and b) it ...
I don't mind getting hired to scare people, because a) it's not very hard and b) it does drive home some very important points that don't get talked about enough. Like how most breaches start with social engineering of one form or another.
But I'm not interested in speaking about how great technology is, because it mostly sucks, and or the implementation of it is completely fumbled. And I'm deeply suspicious of any kind of effort to say that everything's just fine, no need to panic, etc. Fucking panic already.
E.g., the past couple of years have clearly shown that the code powering a ton of the endpoint security hardware out there today is complete cruft, meaning a significant share of the user base is constantly subject to zero-day attacks.
It's kind of like virtual currencies. If I thought for a minute that they were on balance doing more good than massive harm, I wouldn't mind saying so. I'd put current AI efforts in that bucket as well.
But I'm not interested in speaking about how great technology is, because it mostly sucks, and or the implementation of it is completely fumbled. And I'm deeply suspicious of any kind of effort to say that everything's just fine, no need to panic, etc. Fucking panic already.
E.g., the past couple of years have clearly shown that the code powering a ton of the endpoint security hardware out there today is complete cruft, meaning a significant share of the user base is constantly subject to zero-day attacks.
It's kind of like virtual currencies. If I thought for a minute that they were on balance doing more good than massive harm, I wouldn't mind saying so. I'd put current AI efforts in that bucket as well.