-
The concern is over what will happen as strong encryption becomes commonplace with all digital communications and stored data. Right now the use of encryption isn't all that widespread, but that state of affairs is expected to change rapidly.
-
While the vast majority of hackers may be disinclined towards violence, it would only take a few to turn cyber terrorism into reality.
-
While many hackers have the knowledge, skills, and tools to attack computer systems, they generally lack the motivation to cause violence or severe economic or social harm.
-
The best performance improvement is the transition from the nonworking state to the working state.
-
We have never really had absolute privacy with our records or our electronic communications - government agencies have always been able to gain access with appropriate court orders.
-
If we take as given that critical infrastructures are vulnerable to a cyber terrorist attack, then the question becomes whether there are actors with the capability and motivation to carry out such an operation.
-
Further, the next generation of terrorists will grow up in a digital world, with ever more powerful and easy-to-use hacking tools at their disposal.
-
The more equally attractive two alternatives seem, the harder it can be to choose between them - no matter that, to the same degree, the choice can only matter less.
-
A program that produces incorrect results twice as fast is infinitely slower.
-
I prefer leaving things to the market as much as possible.
-
We have three big shows on Sunday, so there will be pressure to spread the wealth.
-
Although cyber attacks have caused billions of dollars in damage and affected the lives of millions, few if any can be characterised as acts of terrorism.
-
I favor strategies that encourage industry to include some sort of key recovery capability in their systems which would also address user requirements for access.
-
The greatest performance improvement of all is when a system goes from not-working to working.
-
Systems are complex, so controlling an attack and achieving a desired level of damage may be harder than using physical weapons.
-
Cyber terrorism could also become more attractive as the real and virtual worlds become more closely coupled, with automobiles, appliances, and other devices attached to the Internet.
-
I think most organizations have an interest in key recovery, at least with respect to stored data.
-
I don't have a particular recommendation other than that we base decisions on as much hard data as possible. We need to carefully look at all the options and all their ramifications in making our decisions.
-
Everyone is a proponent of strong encryption.
-
Generally I'm against regulation.
-
However, leaving everything to the market is not necessarily good for society.
-
Digital mechanics predicts that for every continuous symmetry of physics there will be some microscopic process that violates that symmetry.
-
There are two types of computer languages; those that people hate and those that nobody uses.