Hi All
Do you agree with this approach, whereby letters of Margue are provided, so one can hack back at the attackers themselves? What re-precussions would you expect? What safeguards would you put in place?
https://www.usni.org/magazines/proceedings/2019/october/grant-cyber-letters-marque-manage-hack-backs
Regards
Caute_Cautim
Dangerous idea. This suggests correct attribution has been arrived at for cyber attacks. Since attacks may come from a compromised third party and may be cloud hosted infrastructure subscribed to by that third party, hacking back is frought with difficulties.
@Steve-Wilme I agree, hence my request for comments - if they use proxies, they could be state owned proxies sanctioned through a number of different channels, all pointing in the wrong direction.
Regards
Caute_cautim