I just got permission from Jeff Walker to publicize and build on his 22 Principles for the Perfect Application to create the architecture for The Ultimate Virus (see yesterday's post). But I need to think about this. Given my technical background, I could probably do a pretty good job of designing and building a trigger for a nuclear device, too. But to put that kind of information in the public domain would be pretty damned irresponsible, notwithstanding that Iran can't even get their centrifuges running at the proper speed. I'm going to take a day or two and consider whether or not this is the right thing to do. Jeff's paper is currently in the hands of no more than a dozen people. Maybe it should stay that way.
Perhaps this blog should deal more with the moral and practical implications of The Morgan Doctrine, well articulated by Paco Hope in my Monday post ("If I were a jihadist…"): (1) identifying the (real) perpetrator; (2) determining guilt; (3) applying a fair law; (4) meting out punishment to the guilty.
If you have strong feelings one way or the other, let me know.
No comments:
Post a Comment
Implementation suggestions for THE MORGAN DOCTRINE are most welcome. What are the "Got'chas!"? What questions would some future Cyber Privateering Czar have to answer about this in a Senate confirmation hearing?