Postby Gaur » 08 Jul 2010 22:54
Kanan,
No disrespect, but it seems evident that your knowledge of all things related to IT is non existant. This was evident even in MRCA thread when you argued that missile specific jammers/ electronic attack systems are possible without knowledge of missile systems and software code.
Let me explain in most layman terms possible how malware and hacking works (lets say on windows PC). The windows is a huge software with tens of millions of lines of code. This is because it is a multipurpose OS which is required to perform numerous functions. Obviously, each code cannot be verified multiple times with 100% certrainity. This leaves with loopholes or backdoors which is taken advantage by hackers. And it becomes possible for hackers to hack only because they have the target OS with them with unlimited leisure time to study its code. Plus, the target PC is connected to internet which gives direct network connection and access to the hacker. Even with all these advantages enjoyed by hackers, it becomes near impossible to gain access to a PC or network with a good commercial security software. Now consider, if you will, an aircraft. The OS of various systems of an a/c have limited functions and their codes are "tiny" as compared to multipurpose OS like Windows/MAC OS. Also, the software code is written in a "much" rigid programming language than PC softwares. Eg: Ada is a programming language used to write avionic software. It is so rigid that it leaves virtually little room for flexibility unlike other languages like, say Visual Basic. It is a pain in the ass to program in Ada. Even with most negligible deviation, the code refuses to compile. Such languages are used mainly so that there is no possibility of mistake by the coder. This makes the resulting software much stable and secure. Thats why a/c pilots are not found pressing ctrl+alt+del in their cockpit.
Now, this alledged hacking software in JSF has to break through a network connection it is not connected or has access to, try to break down the code which it has never seen before, a code which is verified thousands of times, a code written in the most rigid programming languages in the world and protected by heavy encryption and security software. And oh! I forgot, it has to do all this in a matter of few minutes.
And dont even get me started on putting a virus into the enemy software. It has not only to do all the above for that but also build a universal virus which should work against any unknown code.
Now, I have explained this in the most elementary way as possible. Now, if you cannot even now see how absurd this whole scenario is, then nobody can help you understand this.
Added later: And in home PCs, there are numerous other softwares installed, which again may leave the comp vunerable. This is not an issue with an a/c.
Added Later: I forgot to mention the most important point. Hacking is done by a person (in most cases a group of persons) with virtually unlimited time and attempts at their disposal. Now, you are telling me that within a few years such AI tech will be created which will be able to do all this in a matter of minutes without the help of any human?
Last edited by
Gaur on 08 Jul 2010 23:18, edited 2 times in total.