5. Thanks for trying to be a smartypants here while showing at the same time that you either didn't read what I wrote or failed to comprehend it. You can certainly show me the "save memory dump on internal hard disk in case of nuclear meltdown nearby" configuration option in IOS, I assume?
5. I can't show you a "save memory dump on internal hard disk in case of nuclear meltdown" but I can show you that you can log memory dump in case of failure. I don't know what router you have at home (and you could do this even in most private ones if you flash the firmware and upload a custom one), so I am going to use Mikrotik CCR1009, which is an excellent router for individual and small business needs. It is nowhere near the quality of an industrial router in a power plant, but it will do. You can easily add a system script with "system script add" and set the policy to "ftp, reboot, read, write, policy, test, winbox, sniff" and every packet and read-write will be immediately recorded.
6. The above Mikrotik router allows for a SD card and boatloads allow for harddrives to be hooked up, but if you are still being picky and looking for a router with a harddrive already built in, then just get WD MyNet N900 Central, as that one comes with an internal hdd that is like 2TB the last time I heard.
8. You can't use the TOR relay network without first getting TOR installed on your system. Without "having" the bundle, you won't get to use the relays. Additionally, you can turn yourself into a part of the relay network and act as a "the onion router" yourself.
As far as the second part - to be completely technical, if you do not think the relay switch constitutes having no unique IP address - it is not mandatory for your own computer specifically to have an IP address for network communication. Intranets can use MAC addresses for device communication instead of IPs, and one could let's say get into a large wifi network (like on a college campus), find an unsecure device that can be used as an external AP, and run their own traffic through that IP. Obviously, an IP would eventually play a role.
21. I have heard of intranets, so let's assume something like Black Widow would be on SiPRNet in post-production, which is a government/military network for communication of classified materials. As of today, you are looking at over 4 million people with access to SiPRNet. Better scenario, it would be on JWICs, which raises the security level up to and beyond top secret. However, FBI has direct access to JWICs at all times, and while the FBI agent would not be able to access the compartments, they would be able to easily relay traffic through that intranet.
23. The better question is why are you so positive the only thing that Hathway gained access to was the frontend.
25. You are right, I thought you were refering to the phone call at the hideout in Jakarta.
26. The staff of a server provider used primarily as a proxy for illegal intrusion would certainly be aware of social engineering methods, or better yet they could do something as simple as have no IT staff to talk to customers directly whatsoever. They customers would post support tickets that would be addressed by the engineers, but the engineers would not speak to customers directly. We have actually done this at one of the company I worked at, and engineers would never talk to customers directly, and there would be CR guys whose only job was to get as much data as possible about the problem, but nothing would be relayed back to them or the clients except for it is fixed now, or a patch has been released.
The NSA guy was fooled by the email address that Hathaway was able to spoof thanks to FBI agents access to JWICs (whose access to the Black Widow has expired), so he could have asked himself "what are the chances he gained access to JWICs on his own?" which would be extremely low, and "what are the chances he knew my supervisors name, email address, managed to spoof his email, and send this very plausible notice". Ultimately, he could have decided that the risk was too low, and the bigger risk was leaving his login info the same. The executive could have even thought it through, and might have been worried that it would be his info that would be used to gain access leading to irreparable career damage, and given the prompt email he would be likely to make an error of judgement. Social engineers often resort to tactics that make their victims believe that their jobs, careers, and bank accounts are at serious risk, as acting as the savior immediately forms a degree of trust between them and the victim. After all, people install the majority of trojans, viruses and keyloggers these days through those fake pop-ups that tell them their systems have been infected.
29. To be honest, the more I think about it the more I hate that scene. I don't even think a security station at an international bank would have anything other than a keyboard-screen terminal for the cameras, and a USB would be a ridiculous security risk.
=======================================
Yeah, I agree with you and I certainly don't think this was great movie, and I would classify it as average at best. The ridiculousness of certain scenes made it painful to watch. I won't even mention the ending shootout in Jakarta (opening fire on a group of monks in a square, with likely dozens of people left dead would certainly make international travel very difficult for the rest of one's natural life), or the lack of character development of the antagonist.
What I found the most ridiculous in terms of action movie realism were the shoot-outs in Hong Kong. Hong Kong has one of the strictest gun control laws in the world, and there is no way the FBI agent or the U.S. Marshal would get to keep their guns. Getting caught with a firearm of any kind will get you over 10 years in prison, and a loaded fully-automatic assault rifle can get you a life sentence. The rate of gun-related homicides in Hong Kong has been essentially 0.0 per 100,000 people for quite a while. There was not a single recorded robbery with a firearm in both 2013 and 2014. Criminals - and especially members of organized crime syndicates - in Hong Kong do not actually use guns, it is an established fact and not just HK movie fiction. The penalties for gun possession are extreme, and typically exceed penalties for crimes one might be committing. Even the military captain from China's PLA would likely not be allowed to carry a firearm (the majority of police officers in China do not carry firearms) in Hong Kong, and to have a pair of federal agents running around with their guns drawn would be inconceivable. A HK police officer could encounter them on the street, see the firearm and draw their own weapon, and one error of judgement on either side could spark an international incident of considerable proportions. Just imagine the headlines "United States FBI agent shot by police in Hong Kong" or worse "U.S. federal agent has shot and killed a HK police officer while attempting to evade arrest".
reply
share