If you don't want people to deconstruct arguments you make, you shouldn't be on a discussion forum.
Let's break it down:
* The FBI concludes that it was North Korea who did it.
* The FBI explains why they think North Korea did it
Now, again, what I'm saying is, if anyone wants to disprove or have found evidence that can overturn any of this, they can go right ahead and do so. That's not on the FBI though. Coming up with excuses and presenting flimsy "evidence" is not gonna cut it.
NPRThe FBI says the attack came from IP addresses unique computer addresses that trace back to North Korea.
But Scott Petry, a network security analyst with the firm Authentic8 says, you can spoof an IP address from anywhere in the world.
"The fact that data was relayed through IPs associated with North Korea is not a smoking gun," Petry says. "There are products today that will route traffic through IP addresses around the world."
Meaning traffic that appears to come from Pyongyang could have originated in Moscow or Baltimore.
The FBI also says the hackers used malicious software that North Korea has used in other cyberattacks.
Petry counters that, in the world of cyberattacks, criminals constantly are recycling code. A well-known attack against banks called the Zeus Trojan went open source a few years ago so when a financial institution gets hit, the same malware often shows up.
WiredFirst off, we have to say that attribution in breaches is difficult. Assertions about who is behind any attack should be treated with a hefty dose of skepticism. Skilled hackers use proxy machines and false IP addresses to cover their tracks or plant false clues inside their malware to throw investigators off their trail. When hackers are identified and apprehended, its generally because theyve made mistakes or because a cohort got arrested and turned informant.
smh.
Fixed2BeBroken said:at least that's what I'm being told in this very thread.
based on the link provided, provided by the FBI, there were 3 bullet points, and all 3 just essentially stated "this hack seems similar to that hack"
that's literally the tl:dr version and to argue otherwise is silly.
not a Ton of evidence. and definitely not definitive.
How could a disgruntled ex sony pictures employee get a hold of that?
Nobody told you that, learn to read.
Surprise meyou'd be surprised
Surprise me
1. We (the western world) didn't like them before. This didn't change our opinions.
2. So what? This in no way explains why we would use them as a scapegoat now.
3. So what? Did this cyber attack have any affect on those relations? We're not attacking them for either offence as well.
4. & 5. The US already sanctions NK and the west doesn't need more reasons to add more.
● Technical analysis of the data deletion malware used in this attack revealed links to other malware that the FBI knows North Korean actors previously developed.
● There were similarities in specific lines of code.
● There were similarities in encryption algorithms.
● There were similarities in data deletion methods.
● There were similarities in compromised networks.
● The FBI also observed significant overlap between the infrastructure used in this attack and other malicious cyber activity the U.S. government has previously linked directly to North Korea.
● In one example given, the FBI discovered that several Internet protocol (IP) addresses associated with known North Korean infrastructure communicated with IP addresses that were hardcoded into the data deletion malware used in this attack.
Why-not-both.jpg
Apparently the methods were incredibly similar to a previous NK hack.
The hackers used a particular kind of software unique to previous attacks by NK. How could some ex sony employee get their grubby hands on this? That's a fair question no?why don't you surprise me? why could they not?
You asked for a motive to lie about North Korea. You were given 5. WORSENING the situation was not the argument.
How can I prove a negative?
The hackers used a particular kind of software unique to previous attacks by NK. How could some ex sony employee get their grubby hands on this? That's a fair question no?
It seems highly implausible without the direct aid of NK therefore NK must have had a hand in this attack. Thats the logic I'm using to make my conclusion. But If you can show how it's not highly implausible I'm willing to here you out
They claimed it was North Korea behind these attacks, yes. This is not knowing, it is actual still disputed in the infosec community.
Reusing code is not a exception, it is standard on the black market. You can guess why. The softwares in question have been leaked years ago.
The similarities are based on the IP adress found. IPs, as you may know, can be permanent or change within seconds. Furthermore, they are public Tor IPs, used for all kinds of malwares in the past, by a variety of cybercriminals. This is, like reusing the publically available malware, a standard practice.
And alas, we are where we are. There will always be doubt in situations like these, and that's only natural.
With that said, I think I'm going to trust the Cyber division of The FBI rather than experts who want to take a crack at them without actually presenting evidence that shows that it wasn't North Korea.
Those 5 motives make all of ZERO sense. That's what I was saying.
The argument is not 'whether or not the FBI's case is fullproof', it's 'whether or not the theory in the OP is a plausible alternative.'
The 'evidence' in the OP is, as presented, infinitely weaker than what the FBI has showed us. So even if you think the FBI's case is weak, the OP's theory has evidence still far weaker yet.
did you just ignore Oersted's post completely?
At what point do you determine when enough evidence is a TON of evidence?based on the link provided, provided by the FBI, there were 3 bullet points, and all 3 just essentially stated "this hack seems similar to that hack"
that's literally the tl:dr version and to argue otherwise is silly.
not a Ton of evidence. and definitely not definitive.
At what point do you determine when enough evidence is a TON of evidence?
The FBI may not have provided definitive evidence, but I think they did provide a significant amount of evidence and explanation for why that evidence would link the hack to NK.
I feel like you're perpetually hammering on your "not a ton of evidence" argument when the FBI had provided the rough equivalent of airline tickets, hotel reservations, and gas station receipts leading between travel points, and you're still claiming it's not enough evidence of travel.
So in other words, do the FBI's job and prove who it REALLY was? That's not how it works. The burden of proof rests with the accuser. And most security experts agree the accuser's proof is flimsy. The evidence is so far is circumstantial.
surely other discussions that branch off from OP in regards to the OP can be had and discussed in a thread can it not?
Do you just like come up with an idea of what you wish people were posting, and then respond to them? Because reading clearly isn't what you're doing. Nothing in this post is even tangentially related to what I said.
If these experts got a better explanation, we're all ears.
oh it is, but you want to continue to insult me. but I can take it so go ahead. get it all out
I've never been convinced by the North Korea hypothesis. While I'm no conspiracy theorist, it seemed too easy to be true and didn't look like the DPRC's style.
No, it isn't. It's not an insult to call a spade a spade. You are not reading at all and you're just making shit up. THAT should insult your own sensibilities.
Please, point to the -precise- lines in what you quoted that says anything about other discussions that branch off from the OP can't be discussed?
If these experts got a better explanation, we're all ears.
Nobody has a better explanation of who exactly it was. It's just that jumping the gun and outright accusing someone based on circumstantial evidence is premature. "We don't know and are still looking" is still a good answer.
The hackers used a particular kind of software unique to previous attacks by NK. How could some ex sony employee get their grubby hands on this? That's a fair question no?
It seems highly implausible to get a hold of this kind of north korean software without the direct aid of NK therefore NK must have had a hand in this attack. Thats the logic I'm using to make my conclusion. But If you can show how it's not highly implausible I'm willing to here you out
So, it's not about the FBI potentially being wrong or not. It's about which theory is currently the most plausible based on evidence presented. The FBI wins so far.
he stated what he wanted to state in regards to your post. regardless of your argument, he is responding with he feels is an appropriate response. you are trying to nullify what he says as if it doesn't matter because you feel your argument is "this" and the only way to counter the argument is in the way you want it to be countered, and your way and your terms. but that's not how conversations work.
just because your argument might be about one thing, his response to part of your argument can and may state something else.
Nobody has a better explanation of who exactly it was. It's just that jumping the gun and outright accusing someone based on circumstantial evidence is premature. "We don't know and are still looking" is still a good answer.
This is some truly next level bullshit. No wonder you believe in conspiracy nonsense.
My argument is indisputably one thing. If he wants to prove my argument wrong, he has to address the argument, not some other random point that has nothing to do with what I said. Not prop up a strawman and then attack it.
He is free to RESPOND any way he chooses, and I am free to rightfully say he is not actually addressing the arguments. A surefire way to not get your point across is to try to argue against shit nobody is even saying.
dead linkhttp://en.www.wikipedia.org/wiki/Shamoon
Give it a read, you might be surprised how far this software unique to North Korea is widespread.
his argument did have to do with something you said tho, and to claim otherwise is just silly.
His response is valid, cause he is countering your argument, with a different argument. that is possible you know.
"While everyone was focused on the Sony hacks (plural), Obama forced another law closer to taking our guns/freedom/money"I'm still waiting for a conspiracy theorist to propose a motive for the conspiracy.
when I think a TON...
I think like more bullet points than 3. Probably like 10 or more.
I mean, when we throw around the word "TON" I'm usually thinking more than triple.
I mean, that was pretty much something certain. A huge hole like this wouldnt happen without someone on the inside helping. Doesnt necessarily mean it wasnt orchestrated by NK.
You're overly fixated on the number of bullet points and instead fail to examine the content of the bullet points, which do provide healthy amounts of evidence.
- If
- my
- argument
- is
- posted
- like
- this
- is
- it
- more
- substantial?
I mean, that was pretty much something certain. A huge hole like this wouldnt happen without someone on the inside helping. Doesnt necessarily mean it wasnt orchestrated by NK.
I knew the Patriots were responsible.
No, what the other posters have provided is why the evidence provided is not decisive. The quantity of evidence is actually significant.i disagree that it was a healthy amount, people have provided good reason already as to why in this thread
No, what the other posters have provided is why the evidence provided is not decisive. The quantity of evidence is actually significant.
You're overly fixated on the number of bullet points and instead fail to examine the content of the bullet points, which do provide healthy amounts of evidence.
- If
- my
- argument
- is
- posted
- like
- this
- is
- it
- more
- substantial?
I'm sure The FBI made a thorough investigation and had the information available to them to conclude their findings, considering that they had direct access and cooperated with Sony and all.