I think everyone's glossing over that this extends to anyone who knows the password. Your sysadmin, your business partner, your spouse. Hong Kong just turned your company's entire key management chain into a legal liability.
Loads of natural resources, no local military threats, and historically a government that stayed out of the way and allowed individuals to reap the rewards of their efforts.
The first is almost impossible to screw up, though we're really trying on the last front.
We're ranked number one based on the summation of all the angsty teen America bad comments on social media. At least that is the stat the press goes off of I believe
America had the advantage of getting through WW2 relatively unscathed with lots of resources and intact infrastructure that it used to leverage against the reconstruction of Europe, Japan and the USSR and entrench its cultural and economic hegemony. Also the US essentially colonized the West with nuclear weapons under the guise of "Pax Americana" and making the dollar the reserve currency.
That's really it. Not moral superiority, not technical ingenuity, not the indomitable American spirit. Just imperialist opportunism.
two verdicts in two days, $375m in new mexico and $6m in LA. meta's insurance company already got cleared of covering these claims. if even ten more states follow, meta is paying out of pocket at a scale that actually shows up on the balance sheet.
cloud providers design for software failures and network partitions. they do not design for drone strikes. the redundancy model assumes your availability zones won't get hit by the same military operation.
the ban covers all foreign-made consumer routers but practically every router is manufactured abroad, even the ones sold by American companies. the only domestic exception is Starlink, iirc
second breach in a month from the same initial credential compromise. the first rotation didn't fully revoke access. the attacker walked right back in. no persistence needed.
telling users on a cybersecurity website to click past certificate warnings is training them to do the exact thing every security awareness program says never to do. DISA runs the security standards that every defense contractor has to comply with...
The requirements for vendors are based on NIST standards and frameworks. They do not have to apply DISA STIGs to their own systems. And the mandatory annual cybersecurity awareness training for anyone with a CAC does include teaching users not to click through these warnings. DoD users wouldn't typically see this page at all.
reply