The more sophisticated the system, the more sophisticated your method must be to break it. Eventually the means to break it will grow out of the reach of guerilla movements
i’m not sure. maybe you’re right but there are a lot of dedicated hackers out there who do some amazing things and bypass very complex security systems.
the person creating a system needs to be correct 100% of the time - the person trying to break it just needs to be correct once. there’s an infinite multitude of things that can go wrong with something and any one of those is an opening to somebody perceptive enough.
and remember advance of technology goes both ways. military gets access to advanced AI, so do their enemies. it’s a game of cat and mouse we’ve been playing for a long time
The more sophisticated the system, the more sophisticated your method must be to break it. Eventually the means to break it will grow out of the reach of guerilla movements
i’m not sure. maybe you’re right but there are a lot of dedicated hackers out there who do some amazing things and bypass very complex security systems.
the person creating a system needs to be correct 100% of the time - the person trying to break it just needs to be correct once. there’s an infinite multitude of things that can go wrong with something and any one of those is an opening to somebody perceptive enough.
and remember advance of technology goes both ways. military gets access to advanced AI, so do their enemies. it’s a game of cat and mouse we’ve been playing for a long time