Human Exploitation: the morals
FIRST OF ALL LET ME JUST SAY YOU DON'T LAUNCH EXPLOITS AT EVERY BOX/EVERYONE
I would like to outline one thing that I believe may be important to point out to the community. Recently on IRC I spent sometime talking to ptales on the issues surrounding social engineering and how to a certain degree everyone can be seen as
As a computer system, or as to how human manipulation is similar to computer exploitation. He outlined to me how this is not a possibility and survival people tried to point out to me how social manipulation is not right. I thought I would take the time to explain my perception of this and so that we can have a place to discuss the morals behind social engineering. My definition of social engineering is psychology. In this post I will focus on the Deception aspect, which has multiple levels to it. All humans are deceptive; anyone who tryst to tell you otherwise has not spent enough time performing self analysis on them self or they are just carrying out a sub conscious social manipulation on you.
Humans and machine are not that much different, our base reality is composed of complex number and so is the operating system and the hardware it runs on ;) . The way computer systems interact is based on human interaction. We have protocols in our world just the same we have protocols in the information realm. Networking and communication is carried out using vocals in the real and packets in the virtual world. Of course the stuff taking place in the virtual realm is by far more complex. It all mainly depends on your understanding
Let's talk about the exploitation of a system/person. If you ping a system and it reply that means that the system is available for exploitation. What is required after that point is to perform a port scan and from that port you analysis the output and use that output in order to find vulnerability to exploit. When exploiting a system it can take a few mins a week or months to break through. It all depends on the complexity of split. This sounds realie bad and somewhat manipulative, this tends to get on peoples nerves especially girls.
I would like to point several things out:
1. Zones of trust: You can have various zone's that you trust and for this zone no firewall nor manipulation is required. There is level of trusted based on specific zone that you may be dealing with. Examples of zones, friends house or works place or club.
2. Firewall/AV systems There are all sorts of firewalls and AV system's available out there one good AV system is religion. Some people choose to make there own or customize it(new age), after all most(if not all) religion is open source
3. LAN environment This is the environment that is in home that you live in. The door is the NAT and also the gateway.
The mental zone is a volatile place and you need to have some honey pots installed if your processing power and memory is fast enough to have that. You should make sure that you protect from the various number of psychological threats that you encounter in your day to day life.
QUESTION ON MY MIND: Is it possible to have security for the brain/mind or is this something that will only aid big brother in achieving his goals ?