some would probably argue that this is a game theory equilibrium where
you wouldn't place the tokens willy-nilly precisely for this reason.
they would probably try to resurrect examples from the cold war or
something where this game theory and top down policy / control "worked"
once before.
Well, that is the point of the thought exercise. :) But the goal is to
have "policy people" go through it so they understand WHY the concept of
"banning hacking on critical infrastructure" is mostly-futile as opposed
to just having to believe us "tech people".
You could, of course, do a
http://cybersecpolitics.blogspot.com/2016/03/cyber-norms-futility-of-blacklisting.html
If you disagree with this post, please spam here instead of twitter,
which has only terse horribleness as its argument protocols. :)
-dave
___
Dailydave mailing