Remove 1999 Remove Design Remove Government Remove Stealth
article thumbnail

Fighting an Asymmetrical Cyber War– Why We Need to Take A Different Approach

Pascal's View

… An apparently perfect device can provide a safe harbor for numerous threats– in the form of old and vulnerable chip designs, Trojan horses, or kill switches– that are difficult or impossible to detect.” government waits, the more devastating the eventual assault is likely to be.” government.

article thumbnail

The Future of Startups 2013-2017

Scalable Startup

And then medium-size businesses start to use it, and then large businesses start to use it, and then eventually the government starts to use it. Marc Andreessen: We have a bunch of stealth investments. And then small businesses start to use it. But this is a complete change from the way it has always worked.