• Carrolade@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    1 month ago

    Depends how its set up. So long as it’s fully independent and disconnected from existing digital infrastructure it should be safer. It could be as simple as explosives hard-wired with a buried line running up into some bunker up in the mountains.

      • Carrolade@lemmy.world
        link
        fedilink
        English
        arrow-up
        0
        ·
        1 month ago

        Note, I said safer, not completely safe. Even a hard line to a bunker simply needs someone to locate the line and activate it.

        Completely safe does not and likely never will exist, as the history of human arms evolution should demonstrate.

    • umbrella@lemmy.ml
      link
      fedilink
      English
      arrow-up
      0
      ·
      1 month ago

      state actors have hacked airgapped equipment before, an actual backdoor will be ripe for exploitation.

        • umbrella@lemmy.ml
          link
          fedilink
          English
          arrow-up
          0
          ·
          edit-2
          1 month ago

          remember the stuxnet botnet, and how nobody knew what it was for?

          turns out it was programmed to activate in the very specific conditions inside the iranian nuclear reactor facilities and sabotage it. the facility was airgapped but stuxnet was so ubiquitous in the country by then, someone just needed to bring the first usb stick in for it to be a pwn. or so goes the story.

          iirc the us and israel admitted to doing it years later, it was somewhere in the obama era and they wanted to sabotage iran’s nuclear program. the systems remained infected for years reporting bogus data and slightly messing with the parameters so it never worked well and their scientists remained stumped until the virus was discovered.

    • UnderpantsWeevil@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      edit-2
      1 month ago

      So long as it’s fully independent and disconnected from existing digital infrastructure it should be safer.

      It’s a puzzle, because anything with too many safety features can be easily disarmed. But anything with too few can be prematurely detonated.

      Imagine what happens to the Taiwanese economy if there’s a Chinese feint or false alarm and the facility bricks itself. A massive economic downturn would not work to the benefit of an island so heavily reliant on foreign trade.

    • Tetsuo@jlai.lu
      link
      fedilink
      English
      arrow-up
      0
      ·
      1 month ago

      By remotely I don’t think they meant a long RJ45 cable connected to nothing.

      So this doesn’t look like a setup that can be fully secure.

      Could even be completely fake and just to dissuade China from invading.

    • AdamEatsAss@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      1 month ago

      That’s what you have to do of you don’t want the invaders to get the tech. If you brick the processors they still have the machines. I’m not sure what the secret sauce is in this case, but china has a reputation of reverse engineering things in spite of foreign laws. The best way to keep it from happening is to make sure they get no part of it.