• 0 Posts
  • 8 Comments
Joined 5 months ago
cake
Cake day: September 15th, 2024

help-circle
  • You’re right, the behavior of how Iraq and Afghanistan were handled was entirely different from either Germany or Japan after WW2.

    My assertion is that the USA did too much “occupation” and not enough “governance”. Both Iraq and Afghanistan essentially had anti-government resistance movements forced into pseudo-national rule without any time to develop local governance.

    Once the states were broken W wanted to get out, essentially since he feared accusations of imperialism. Which kept a good twenty year plan from being implemented, and instead led to a twenty year quagmire with one of the two essentially being a failed state.

    (Man, that’s a lot of essentially’s)

    I don’t mean to defend either invasion as either good for the people or necessarily for American security. I just want to point out that W’s position was “go and break things then go home” which is about as imperial as a viking raid.







  • Are there any real-world examples where encryption backdoors have been successfully used without compromising cybersecurity?

    No. Adding a backdoor to cybersecurity is fundamentally introducing a vulnerability that can be exploited by an attacker.

    A backdoor in your IT security is like a hidden button to bypass the lock on the impenetrable front door of your impenetrable house. Sure, it makes the police serving a warrant easier, but now there’s a button that anyone can push to bypass your door.

    What you will find are instances with no apparent violations. Just like setting all the nuclear weapons to have the exact same easily remembered activation code didn’t actually lead to a nuclear exchange.