August 6, 2022
I agree with this.
But here is where I diverge.
We have not fought for land, we have fought for power. Historically, power has derived from land. Resources in the land itself, or from the land via exploitation.
Agrarian societies use land to produce grain. Grain is a very special resource because grain is, among foodstuffs, uniquely easy to tax. It is quantifiable, it is fungible, it is storable, it is compact, and you can’t run away with a field of grain when the tax man comes. And, of course, grain is edible, so it has intrinsic value.
The hallmarks of the state are appropriation, inequality, and hierarchy. Due to its affinity for appropriation, grain enables the state. Grain requires farms, which require farmers and land.
Which is why land has been worth fighting over. Control over resources brings power. Wars and conflict for control over land are about power. The victor reaps the rewards of their success by gaining control over more resources, which gets more power.
Land creates conflict not because of scarcity, but because of resources. Creating artificial scarcity in cyber will not inherently lead to conflict, just as not creating it won’t prevent conflict.
Where am I going with this? Cyber doesn’t have a physics of space in the way that land does, but it still has resources. There is still power to be had from control over resources.
I’m not suggesting that @noahpinion is unaware that there will be conflict in cyber; rather, we don’t need to do anything to bring conflict to cyber. As Giulio Douhet said, “wherever two men meet, conflict is inevitable”1
The seeds of conflict already exist in cyber. They are not necessarily directly analogous to the proximate causes of violent conflict in the kinetic world, but they are fundamentally the same thing — resources. Resources which the victor exoects to exploit for power.
-
-
-
-
-
-
-
Tricks to gaming users and gaming the system. An incredibly depressing thread about how to make successful iOS apps. Ugh.
-
This vulnerability allowed anyone to submit an email address or phone number, verify if it was associated with a Twitter account, and retrieve the associated account ID. The threat actor then used this ID to scrape the public information for the account.
Kind of misleading to call this a 0day since it is a bug in exactly one application — Twitter.
https://www.bleepingcomputer.com/news/security/twitter-confirms-zero-day-used-to-expose-data-of-54-million-accounts/-
-
-
Wait till sec 28, shit goes down, molten steel everywhere. The workers are so calm cause this does happen sometimes and they are well trained for these situations.Giulio Douhet, Joseph P Harahan, Richard H Kohn, and Dino Ferrari. 1998. The Command of the Air. Tuscaloosa, Al: University Of Alabama Press.pg. 3