Military History | How To Make War | Wars Around the World Rules of Use How to Behave on an Internet Forum
Korea Discussion Board
   Return to Topic Page
Subject: ROKN Patrol Corvette sucken by DPRK torpedo boat
YelliChink    3/26/2010 12:10:07 PM
Just happened 2150 Korean local time. Chinese reports say that it was DPRK torpedo boat. The ROKN corvette sunk is probably a 1200t PCC. I can't read Korean so I am not sure which one exactly. At this moment, 59 out of 104 crew have been saved so far. Best wishes to the still missing ones and condolence to families of lost sailors.
Quote    Reply

Show Only Poster Name and Title     Newest to Oldest
Hamilcar    5 million zombiebots and counting.    5/13/2010 4:19:28 AM
Not all of that is about phishing, or cyber-attacks. Most of it is raw computing power.
Quote    Reply

DarthAmerica       5/13/2010 4:54:07 AM
Just more confirmation that the NorKs have capabilities that aren't very widely known by the general public or even paid OSINT like Janes.
Quote    Reply

Hamilcar    ???????????????????????????????????/   5/13/2010 5:09:37 AM
PRCs are not DPRK.

Quote    Reply

CFG    NoK can copy easy from China   5/13/2010 8:42:29 AM
... ... ...
NoK it seam to me more and more ripe ...
What will do China about that loose canon?" align="absmiddle" border="0" alt="" />
Quote    Reply

heavy       5/13/2010 11:11:15 AM
Quote    Reply

heavy       5/13/2010 11:11:33 AM
I would hazard that their dedicated computing power is underestimated and their distributed computing power is overestimated, for a couple reasons:

- The technical barrier to entry to create a locally clustered computer using commodity hardware and open source software is so low as to be non-existent. The only meaningful limit is the electricity required to drive and cool such a data center, but technically there is no reason at all that they haven't built such centers.

- Distributing such number crunching onto a botnet opens the project up to espionage and sabotage, in terms of tracking the progress and polluting the results (admittedly hard to do). They are certainly exploiting zombie cycles, not just zombie NICs, but those cycles are far more likely to be dedicated to mundane key cracking and so on.

Also be aware that there is a qualitative difference between the aforementioned official linux machines and the marauding botnets, in that the zombie hordes are generally pirated -> unpatched -> exploited Windows clients, which exist in massive raw numbers and can essentially be commandeered at will without the actual user so much as being aware, while the linux clients out there are going to be doing actual work running ministries and whatnot, not running Fission@Home or what have you.

Just idle speculation, but if you're looking for their nuke supercomputers, start with their powerplants. Also, for such things, good network connectivity is not required or even desirable, so it could be remote.
Quote    Reply

VelocityVector       5/13/2010 12:17:23 PM


This link ought to give grid proponents something to chew on.  I like to think of it as one of our little technical windows into China ;>)  Good observations, Heavy.


Quote    Reply

CFG       5/13/2010 12:34:05 PM
You are right heavy, again, inclusive in that those Windows 'clients' are more desirable, users are not aware and the trace almost stop there.
gf, DA and H were on a little different side/facet of the subject.

The bottom line is that NoK can and may have means in this respect. If the NoK regime does not chose to act in peaceful way, the threat is real. And is not in the best interest of China. That's way China must have plans in case NoK continue to act as it did in past decades.
Should China accept more refugee? Because for sure NoK regime will send more, is one of safety valve. This one and the labor camps. Now that North Korean people are listening more on foreign media, for sure that this 2 valves will be used.
Quote    Reply

heavy       5/13/2010 12:53:59 PM
That's great context for what they've achieved in terms of "white" projects that are designed to interoperate (network via the internet or supplementary backbones) with foreign academic institutions and the like. There is of course far too much transparency (exposure) there for anything like this to be employed for nukes, although it is a good marker for what they can throw together domestically.

Here's a good example of just how many ways there are to stack up flops..
Quote    Reply

CFG    Yeah, good example. Knew it :)   5/13/2010 1:36:21 PM
Quote    Reply