Manually attacking your adversary is so 1900s. Train a MASSIVE ai on every classified hacking methodology/procedure document in existence, give it the adversary’s IP ?range, and press GO.
That would just cause chaos. Which might benefit the attacker but I think you’d be better off with smaller targeted strikes using the secret catalog of CIA/NSA hacking tools already available to them. Or I suppose why not do both.
Manually attacking your adversary is so 1900s. Train a MASSIVE ai on every classified hacking methodology/procedure document in existence, give it the adversary’s IP ?range, and press GO.
That would just cause chaos. Which might benefit the attacker but I think you’d be better off with smaller targeted strikes using the secret catalog of CIA/NSA hacking tools already available to them. Or I suppose why not do both.