History Main / EverythingIsOnline

20th Feb '17 5:02:20 PM nombretomado
Is there an issue? Send a Message


* Even your phone conversations aren't safe these days, and not just from the NSA: as the [[http://en.wikipedia.org/wiki/News_International_phone_hacking_scandal News International phone hacking scandal]] demonstrated. [[BritishNewspapers Certain newspapers (including the defunct News of the World)]] had been hacking into the voicemail accounts of everyone from missing schoolgirl Milly Dowler to the victims of the 7/7 London bombings to the [[UsefulNotes/TheBritishRoyalFamily Royal Family]].

to:

* Even your phone conversations aren't safe these days, and not just from the NSA: as the [[http://en.wikipedia.org/wiki/News_International_phone_hacking_scandal News International phone hacking scandal]] demonstrated. [[BritishNewspapers [[UsefulNotes/BritishNewspapers Certain newspapers (including the defunct News of the World)]] had been hacking into the voicemail accounts of everyone from missing schoolgirl Milly Dowler to the victims of the 7/7 London bombings to the [[UsefulNotes/TheBritishRoyalFamily Royal Family]].
19th Jan '17 5:49:59 AM __Vano
Is there an issue? Send a Message


One would assume that any security-sensitive computer system would avoid being connected to anything. It is so, and [[https://en.wikipedia.org/wiki/Category:Wide_area_networks there do exist a number of regional and even global networks that are completely separate from the Internet and are often built with different technologies]]. Yet, every such barrier means tons of wasted work time (which equals wasted money for the company) for users and sysadmins alike, and it costs an obscene amount of money to build and maintain such networks for only a few parties to use. Very few organizations have the resources or the will to construct their own air-gap networks, so all the traffic flows over the public Internet or telecommunications networks protected by [[ShieldsAreUseless VPNs and firewalls]]. Same goes for different technologies: ''every'' piece of software logic ever created for TCP/IP needs to be reimplemented if one needs it for a service built on a differect technology, making the latter severely lack in features and maintainability. Then, as the technologies behind the Internet pass the test of time, scrunity and the resulting security fixes over the years -- having had far more exposure to threats than any in-house tech ever could -- physically separating communication channels for a system to stay secure becomes less and less of a requirement. Finally, even if a private network is air-gapped properly, this is still not a complete guarantee of security, as famously demonstrated by Stuxnet, which is thought to have spread to Iranian nuclear facilities through USB drives. Even supposedly closed-access systems aren't, as demonstrated by Chinese hackers stealing fighter jet plans from the US government. So nowadays, even control units for critical infrastructure only come with an RJ-45 connector and a hard-coded ability to speak IP.

to:

One would assume that any security-sensitive computer system would avoid being connected to anything. It is so, and [[https://en.wikipedia.org/wiki/Category:Wide_area_networks there do exist a number of regional and even global networks that are completely separate from the Internet and are often built with different technologies]]. Yet, every such barrier means tons of wasted work time (which equals wasted money for the company) for users and sysadmins alike, and it costs an obscene amount of money to build and maintain such networks for only a few parties to use. Very few organizations have the resources or the will to construct their own air-gap networks, so all the traffic flows over the public Internet or telecommunications networks protected by [[ShieldsAreUseless VPNs and firewalls]]. Same goes for different technologies: ''every'' piece of software logic ever created for TCP/IP TCP/IP, WWW, or any of the many related protocols and standards needs to be reimplemented if one needs it for a service built on a differect technology, making the latter severely lack in features and maintainability.in comparison. Then, as the technologies behind the Internet pass the test of time, scrunity and the resulting security fixes over the years -- having had far more exposure to threats than any in-house tech ever could -- physically separating communication channels for a system to stay secure becomes less and less of a requirement. Finally, even if a private network is air-gapped properly, this is still not a complete guarantee of security, as famously demonstrated by Stuxnet, which is thought to have spread to Iranian nuclear facilities through USB drives. Even supposedly closed-access systems aren't, as demonstrated by Chinese hackers stealing fighter jet plans from the US government. So nowadays, even control units for critical infrastructure only come with an RJ-45 connector and a hard-coded ability to speak IP.
19th Jan '17 5:33:21 AM __Vano
Is there an issue? Send a Message


While one would assume that any security sensitive computer system would avoid being connected to anything, most users and Sys-Admins will fight to the death to avoid complicating their [[MicrosoftWindows Windows updates]] and Gmail access so most computer systems end up attached to the internet. Even control units for critical infrastructure now only come with an RJ-45 connector and a hard-coded ability to speak IP. Very few organizations have the resources or the will to construct their own air-gap networks, so all the traffic flows over the public Internet or telecommunications networks protected by [[ShieldsAreUseless VPNs and firewalls]]. Finally, even if a system is air-gapped properly, this is still not a complete guarantee of security, as famously demonstrated by Stuxnet, which is thought to have spread to Iranian nuclear facilities through USB drives. Even supposedly closed-access systems aren't, as demonstrated by Chinese hackers stealing fighter jet plans from the US government.

to:

While one One would assume that any security sensitive security-sensitive computer system would avoid being connected to anything, most anything. It is so, and [[https://en.wikipedia.org/wiki/Category:Wide_area_networks there do exist a number of regional and even global networks that are completely separate from the Internet and are often built with different technologies]]. Yet, every such barrier means tons of wasted work time (which equals wasted money for the company) for users and Sys-Admins will fight to the death to avoid complicating their [[MicrosoftWindows Windows updates]] sysadmins alike, and Gmail access so most computer systems end up attached it costs an obscene amount of money to the internet. Even control units build and maintain such networks for critical infrastructure now only come with an RJ-45 connector and a hard-coded ability few parties to speak IP.use. Very few organizations have the resources or the will to construct their own air-gap networks, so all the traffic flows over the public Internet or telecommunications networks protected by [[ShieldsAreUseless VPNs and firewalls]]. Same goes for different technologies: ''every'' piece of software logic ever created for TCP/IP needs to be reimplemented if one needs it for a service built on a differect technology, making the latter severely lack in features and maintainability. Then, as the technologies behind the Internet pass the test of time, scrunity and the resulting security fixes over the years -- having had far more exposure to threats than any in-house tech ever could -- physically separating communication channels for a system to stay secure becomes less and less of a requirement. Finally, even if a system private network is air-gapped properly, this is still not a complete guarantee of security, as famously demonstrated by Stuxnet, which is thought to have spread to Iranian nuclear facilities through USB drives. Even supposedly closed-access systems aren't, as demonstrated by Chinese hackers stealing fighter jet plans from the US government.
government. So nowadays, even control units for critical infrastructure only come with an RJ-45 connector and a hard-coded ability to speak IP.
10th Dec '16 10:44:56 PM Premonition45
Is there an issue? Send a Message


* ''Film/WarGames'', probably [[UrExample one of the earlier instances of this trope]], relies on the idea that the computer that controls the launching of nuclear missiles is accessible to anyone with a 300 baud modem. Of course, the creator of the [[AIIsACrapshoot not-so evil A.I.]] put in a [[AppliedPhlebotinum backdoor password]]; [[ThePasswordIsAlwaysSwordfish his son's name]]. In this case, [=WOPR=] was not supposed to be accessible from outside. It was a grave switching error at a phone company that made it possible.

to:

* ''Film/WarGames'', probably [[UrExample one of the earlier instances of this trope]], relies on the idea that the computer that controls the launching of nuclear missiles is accessible to anyone with a 300 baud modem. Of course, the creator of the [[AIIsACrapshoot not-so evil A.I.]] put in a [[AppliedPhlebotinum backdoor password]]; [[ThePasswordIsAlwaysSwordfish his son's name]]. In this case, [=WOPR=] [[UnbuiltTrope WOPR was not supposed to be accessible from outside. It was a grave switching error at a phone company that made it possible.]]
22nd Nov '16 11:14:10 PM mk097
Is there an issue? Send a Message

Added DiffLines:

* In ''WesternAnimation/TheAmazingWorldOfGumball'' episode "The Internet," Gumball and Darwin attempt to reach their destination, but the titular Internet hacks into pedestrian crossing signals, police databases, and even a fire hydrant to impede their progress. There's so much technology everywhere that they resort to [[MundaneSolution going through the technology-free park instead]].
12th Nov '16 4:02:36 PM zarpaulus
Is there an issue? Send a Message


* In ''Film/EagleEye'', the VoiceWithAnInternetConnection who guides the protagonists, (ab)uses the fact that Everything Is Online to control every bit of electric machinery to aid the protagonists in their tasks. Traffic lights, security cameras, metros, mobile phones, electronic billboards, everything can be manipulated. Even construction cranes. And the movie, via timestamps on computers, shows it takes place in the distant future of January 2009.

to:

* In the 2008 film ''Film/EagleEye'', the VoiceWithAnInternetConnection who guides the protagonists, (ab)uses the fact that Everything Is Online to control every bit of electric machinery to aid the protagonists in their tasks. Traffic lights, security cameras, metros, mobile phones, electronic billboards, everything can be manipulated. Even construction cranes. And the movie, via timestamps on computers, shows it takes place in the distant future of January 2009.
31st Oct '16 5:08:03 PM CumbersomeTercel
Is there an issue? Send a Message


* In the first-season ''Series/{{Buffy|the Vampire Slayer}}'' episode "I Robot, You Jane", a demon is scanned out of the pages of an ancient book and into a file on a school computer. For the rest of the episode, he's considered "on the web," and bad things happen around the world because of "computer error." Giles and Buffy worry that the demon's presence on the web will give him the opportunity to meddle with traffic signals, destabilize the world's economies, and launch nuclear missiles.

to:

* In the first-season ''Series/{{Buffy|the Vampire Slayer}}'' episode "I "[[{{Recap/BuffyTheVampireSlayerS1E8IRobotYouJane}} I Robot, You Jane", Jane]]", a demon is scanned out of the pages of an ancient book and into a file on a school computer. For the rest of the episode, he's considered "on the web," and bad things happen around the world because of "computer error." Giles and Buffy worry that the demon's presence on the web will give him the opportunity to meddle with traffic signals, destabilize the world's economies, and launch nuclear missiles.



** One of the systems connected was comunication (or it was a miss-translation, havent seen the episode in english) so getting a virus in is not that silly.

to:

** One of the systems connected was comunication communication (or it was a miss-translation, havent haven't seen the episode in english) English) so getting a virus in is not that silly.
22nd Oct '16 6:46:18 PM Nerrin
Is there an issue? Send a Message

Added DiffLines:

* That "Internet of Things" mentioned further up in this section? Yeah, that [[https://krebsonsecurity.com/2016/10/hacked-cameras-dvrs-powered-todays-massive-internet-outage/ was responsible for a late-October 2016 massive Denial of Service attack]]. A major internet infrastructure company servicing numerous large sites was attacked by a massive botnet made up not of infected computers, but by ''remote-access cameras and [=DVRs=]''. The future is now and your toaster may soon be plotting against you.
11th Oct '16 2:23:51 AM LondonKdS
Is there an issue? Send a Message


* John Henry from ''Series/TerminatorTheSarahConnorChronicles'' is able to control lights, elevators, and normal doors through the Internet where he is physically located, and it is explicitly stated that he has been linked into those systems at the behest of the company's owner. There's no mention of it being done 'through the Internet'.

to:

* Justified when the AI John Henry from ''Series/TerminatorTheSarahConnorChronicles'' is able to control lights, elevators, and normal doors through in the Internet building where he is physically located, and as it is explicitly stated that he has been linked into those systems at the behest of the company's owner. There's no mention of However, in a later episode, it being done 'through the Internet'.is revealed that he has discovered how to tap telephones throughout California, at least.
24th Sep '16 10:33:40 PM aawood
Is there an issue? Send a Message

Added DiffLines:

** It... Isn't quite as bad as it sounds. Although the ships look slightly organic it's never actually stated (no mention of a "brain" either), and they didn't just decide on a whim to try hacking the ship with a laptop they just happened to have; the point of going was to implant a virus they'd created in advance. This still leaves how someone could make a virus for an alien ship, let alone from a human computer (in a matter of hours!), but the original intent (made clearer in deleted scenes) was that our computing technology was based on the crashed ship at Area 51, and hence worked the same way. Handled better, this could've been a justified trope.
This list shows the last 10 events of 127. Show all.
http://tvtropes.org/pmwiki/article_history.php?article=Main.EverythingIsOnline