Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> 1. The Chinese government is more than capable of stopping all of the types you listed.

I dont think this is technically possible.

Or you are assuming vastly more advanced technologies possessed by Chinese government.

From what we know from Chinese tech company and track record, I doubt this is true.

> 2. ... (see Github DDoS for a high-profile recent example).

Links?

> 3. The US intelligence community has stated that in many cases, the Chinese government is behind attacks. I might distrust the US intelligence community, but this is not something they need to lie about.

They have all the benefit to lie about it:

- Create fear for adversaries. It used to be USSR, now its CCP.

- Assume the moral high-ground for their own surveillance or espionage activities, both domestically and internationally.

- Setup the stage for error-increasing budget for their long-term survivability.

- Cover up their incompetency of guarding national secrets (the adversary is so strong that our defense is not sufficient)

These are just some random possibilities, insiders can give probably much more.

> 4. When Obama and Xi agreed that the US and China would stop infiltrating each other's networks, the breaches stopped.

Links?



> I dont think this is technically possible.

> Or you are assuming vastly more advanced technologies possessed by Chinese government.

> From what we know from Chinese tech company and track record, I doubt this is true.

It is not technically feasible, but legal consequences serve as sufficient deterrent. Not many people in the US would carry similar activities. It helps that just about all Chinese corporations are really state enterprises. It looked like state intervention might eventually disappear while Hu was in power, but under Xi, the CCP has gotten much more involved. No Chinese corporation will continue to steal US intellectual property if the party instructs them not to.

As for technical feasibility, if any country has the capability to detect those intrusions, it's China. All internet traffic in China passes through a government filter, and you're only allowed to move encrypted data if you're small fish and the CCP doesn't feel at all concerned about what you're doing. So they can monitor internet traffic better than any other state.

The hacks you hear about are not super advanced wizardry. It's mundane script kiddie stuff but with hundreds if not thousands of people behind it dedicating their full day to it. Our networks are full of security holes.

> They have all the benefit to lie about it: [...]

I concede those are pretty good reasons, but they would unravel sooner or later if there were no truth to them. It is true that this creates fear, that the US is trying to maintain high ground, that this keeps the IC budget growing. But that does not mean China is not hacking into American businesses. I assure you that China would have been much more indignant in fighting the charge if there were no substance to the IC claims.

What I would like you to consider is this: why would China not steal US secrets? Their economy is modernising, and this is exactly the kind of thing they need to speed that modernisation. This is not unique to China, by the way. Every young economy breaks the rules before it joins "The First World". See China's fight to keep its classification as a developing market, their currency manipulation, and how China is setting up shop in any place they can to avoid tariffs, quotas and other import restrictions. Hacking into American (and Canadian and European) businesses is not a wild suggestion -- what would be mysterious is China not hacking Western businesses.

> Links?

It's quite easy to find the stuff I mentioned earlier using a search engine.


>I concede those are pretty good reasons, but they would unravel sooner or later if there were no truth to them.

Yes, surely if you would spend billions to fight a imaginary enemy whos people have to wait in line for toilet paper, that would be something you would remember.

Man, those people in the Security Community are so incompetent, they trashed there own paper-potemkin-advesary (russia) by accident and now have to make up a new one.

Not even congress would buy that more Hightech is necessary to fight the taliban.

Best would be, if the US accepted that there wil always be some ridiculous spending on "imagined advesaries" and choose the advesaries more by the potential tech outcome.

Im pretty sure, those Antarcticans are plotting to conquer the Asteroid belt - building energy collecting deathrays and the evil Europeans are trying to establish underwater colonys on europa. Death to Antarctica!


>It's quite easy to find the stuff I >mentioned earlier using a search >engine

If you make the claims, it's on you to provide the proof, not on us to go out and search and find or not find it.



If you insist on being handed the truth, doing no research yourself, what makes you think what is then placed in your hands is the truth?


Not really as this is not a scientific journal. You can accept or reject my claims as you wish, and you can research their factuality if you’d like.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: