TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Backdooring Popular Software

1 pointsby daly4 months ago
Suppose there is a piece of software that is currently running on most computer platforms, e.g. phones, laptops, towers, servers, etc.<p>Suppose further that you don&#x27;t have the source code.<p>Now suppose that a backdoor &#x2F; virus &#x2F; malware is pushed out on a given day to all these devices with the intention of bricking them.<p>Suddenly the internet is down (servers), the power grid is down, the phone network is down. Everything that runs this software is dead. Within 24 hours almost all computing-based things stop.<p>It can take weeks to disassemble, reverse engineer, find malware, and develop a fix. Doing so without communication (internet, phone) would require someone with a great deal of skill on an isolated, generator based, non-networked machine with all of the required software to support the task. Hopefully the bricked machines can be rebooted and recovered but hand-distributing the fix will take many months.<p>Or suppose you want to know the position and motion of every asset in government and business. Every mobile phone begins reporting every location and every motion. What possible use would it be if war broke out to know the position and strength of every asset?<p>Or suppose you wanted a distributed denial of service attack from every device running this software.<p>Or even such benign tasks as scraping every phonebook on every phone to construct a call graph of who-calls-who.<p>That can&#x27;t happen of course. It&#x27;s kittens all the way down. What could go wrong?

no comments

no comments