Pegasus and our digital independence
Feb 20, 2024 11:31:28 GMT 2
Post by account_disabled on Feb 20, 2024 11:31:28 GMT 2
Joaquín Ramón López Bravo | Pegasus: ethereal horse that, like the Trojan horse, is a poisoned gift. He carries in his gut the germ of war and destruction. Israeli intrusive software ( sorry for the redundancy) indeed carries a germ of struggle in itself. The name is very well chosen. Pegasus was the son of the blood of a Medusa raped by Poseidon who was also turned into a monster by Athena. Before her rape, she was beautiful (or at least that's how Ovid tells it) and priestess of Athena herself in whose temple the sea god completed his rape. And instead of punishing the rapist, the goddess (also female) punishes the raped. Olympus would not resist even the first analysis on machismo and Human Rights. The gods have never worried about such minutiae. No choice is harmless or innocent. But the name of the spyware that has filled so many pages of newspapers and hours of radio and television, has many facets that allow us to analyze the phenomenon from almost all points if we read about the classical Greeks. But the one that interests me today is that of a spy who flies invisible in the ether and is easily inoculated in that device that today ties us to reality more than our own eyes: the mobile phone. Evidently easy because it has circumvented all the security prevention systems of the relevant citizens of this Spain of ours.
And that's what I'm going for. If it is so easy to install a spy program on terminals that apparently have all the security in the world (of course it may have been installed by the person in charge of that security, but that is another matter) what can they not do with less protected devices? ? And I'm not just talking about our own cell phones. We are too small for someone to spy Australia Phone Number on us one by one. This brings to mind that small-town pride of some national heroes about their importance for having received some harmful attention for “being rich” or “powerful.” You are nobody if they haven't taken compromising photos of you or spied on you. Things of our idiosyncrasy. If national defense must have the ultimate objective of protecting citizens and the national territory from attacks by foreign powers and loss of national autonomy, it is absolutely evident that the defense of the “ether” No. Our phones are not (too) important to be hacked. But today almost all weapons of war, and I include incorporeal ones, such as the communication of hoaxes and false information, use, I would say require, a computer program to function. Hackable computer program.
And I have already warned in previous articles, for example here when I commented on the budgets allocated to Defense and the low amounts for R&D&I, and here where I stated that “national security” is no longer an issue that depends only and mostly on the weapons, the importance of investing in computer security systems and not only in the field of weapons or military logistics, but in the protection of all citizens and the national territory which, without a doubt, includes wireless, digital , computer scientist or whatever we want to call it. We constantly know of orchestrated cyber attacks against elements of civil society. According to the company specialized in networks and personal data DATOS 101, in 2021 there were an average of 40,000 cyber attacks per day, which represented an increase of 125% over those produced in 2020. And some very high-profile ones, such as the one suffered by the State Public Employment Service (SEPE), attacked by a malicious program known for a long time and which could not be stopped, however, there was no antidote, no protection weapon. Or those that the companies Glovo, Phone House or Media Markt suffered.
And that's what I'm going for. If it is so easy to install a spy program on terminals that apparently have all the security in the world (of course it may have been installed by the person in charge of that security, but that is another matter) what can they not do with less protected devices? ? And I'm not just talking about our own cell phones. We are too small for someone to spy Australia Phone Number on us one by one. This brings to mind that small-town pride of some national heroes about their importance for having received some harmful attention for “being rich” or “powerful.” You are nobody if they haven't taken compromising photos of you or spied on you. Things of our idiosyncrasy. If national defense must have the ultimate objective of protecting citizens and the national territory from attacks by foreign powers and loss of national autonomy, it is absolutely evident that the defense of the “ether” No. Our phones are not (too) important to be hacked. But today almost all weapons of war, and I include incorporeal ones, such as the communication of hoaxes and false information, use, I would say require, a computer program to function. Hackable computer program.
And I have already warned in previous articles, for example here when I commented on the budgets allocated to Defense and the low amounts for R&D&I, and here where I stated that “national security” is no longer an issue that depends only and mostly on the weapons, the importance of investing in computer security systems and not only in the field of weapons or military logistics, but in the protection of all citizens and the national territory which, without a doubt, includes wireless, digital , computer scientist or whatever we want to call it. We constantly know of orchestrated cyber attacks against elements of civil society. According to the company specialized in networks and personal data DATOS 101, in 2021 there were an average of 40,000 cyber attacks per day, which represented an increase of 125% over those produced in 2020. And some very high-profile ones, such as the one suffered by the State Public Employment Service (SEPE), attacked by a malicious program known for a long time and which could not be stopped, however, there was no antidote, no protection weapon. Or those that the companies Glovo, Phone House or Media Markt suffered.