A zero-day exploit is a method of hacking a system. It's sort of a vulnerability that has an exploit written for it, sort of a key and a lock that go together to a given software package. It could be an internet web server. It could be Microsoft Office. It could be Adobe Reader or it could be Facebook.
The United States need to be focusing more on creating a more secure, more reliable, more robust, and more trusted internet, not one that's weaker, not one that relies on this systemic model of exploiting every vulnerability, every threat out there.
If the United States is promoting the development of exploits, of vulnerabilities, of insecurity in this critical infrastructure, and we're not fixing it when we find it, instead we put it on the shelf so we can use it the next time we want to launch an attack against some foreign country. We're leaving ourselves at risk.
The bare bones tools for a cyber-attack are to identify a vulnerability in the system you want to gain access to or you want to subvert or you want to deny, destroy, or degrade, and then to exploit it, which means to send codes, deliver code to that system somehow and get that code to that vulnerability, to that crack in their wall, jam it in there, and then have it execute.
You can show a guy sort of peeking over the wall, you can see a guy tunneling underneath, you can see a guy going through the front door. All of those, in cyber terms, are vulnerabilities, because it's not that you have to look for one hole of a specific type. It's the whole paradigm.
People have to be free to investigate computer security. People have to be free to look for the vulnerabilities and create proof of concept code to show that they are true vulnerabilities in order for us to secure our systems.
When the United States cannibalize dollars from the defensive business of the NSA, securing our communications, protecting our systems, patching zero-day vulnerabilities, and instead we're giving those dollars to be used for creating new vulnerabilities in our systems so that they can surveil us and other people abroad who use the same systems.
Follow AzQuotes on Facebook, Twitter and Google+. Every day we present the best quotes! Improve yourself, find your inspiration, share with friends
or simply: