{"id":2113,"date":"2011-06-02T13:08:31","date_gmt":"2011-06-02T13:08:31","guid":{"rendered":"http:\/\/spinor.info\/weblog\/?p=2113"},"modified":"2011-06-02T13:08:31","modified_gmt":"2011-06-02T13:08:31","slug":"the-lady-doth-protest-too-much-methinks","status":"publish","type":"post","link":"https:\/\/spinor.info\/weblog\/?p=2113","title":{"rendered":"The lady doth protest too much, methinks"},"content":{"rendered":"<p>Although the Chinese are <a href=\"http:\/\/www.voanews.com\/english\/news\/asia\/east-pacific\/China-Rejects-Google-Hacking-Claim-123013513.html\">protesting loudly<\/a>, too loudly perhaps, I have no reason to question the credibility of Google&#8217;s claim that recent attacks targeted at high-profile Gmail accounts were, in fact, coming from China. As a matter of fact, I can confirm from my own experience that a clear majority of automated &#8216;bot attacks intercepted by my server originate from Chinese IP addresses (here is a recent small sample of 14 attempts: 5 came from China, 2 from the US, 1 each from Japan, Bulgaria, Thailand, Ecuador, Poland, Singapore and Brazil; a previous data set of 15 attempts included 6 from China and 1 from Hong Kong). Which is why I thought it was high time for the Pentagon to declare publicly that hacking <a href=\"http:\/\/www.theregister.co.uk\/2011\/05\/31\/hacking_as_act_of_war\/\">can constitute an act of war<\/a>.<\/p>\n<fb:like href='https:\/\/spinor.info\/weblog\/?p=2113' send='true' layout='standard' show_faces='true' width='450' height='65' action='like' colorscheme='light' font='lucida grande'><\/fb:like>","protected":false},"excerpt":{"rendered":"<p>Although the Chinese are protesting loudly, too loudly perhaps, I have no reason to question the credibility of Google&#8217;s claim that recent attacks targeted at high-profile Gmail accounts were, in fact, coming from China. As a matter of fact, I can confirm from my own experience that a clear majority of automated &#8216;bot attacks intercepted <a href='https:\/\/spinor.info\/weblog\/?p=2113' class='excerpt-more'>[&#8230;]<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[51,5],"tags":[],"class_list":["post-2113","post","type-post","status-publish","format-standard","hentry","category-computer-security","category-politics","category-51-id","category-5-id","post-seq-1","post-parity-odd","meta-position-corners","fix"],"_links":{"self":[{"href":"https:\/\/spinor.info\/weblog\/index.php?rest_route=\/wp\/v2\/posts\/2113","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/spinor.info\/weblog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/spinor.info\/weblog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/spinor.info\/weblog\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/spinor.info\/weblog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2113"}],"version-history":[{"count":1,"href":"https:\/\/spinor.info\/weblog\/index.php?rest_route=\/wp\/v2\/posts\/2113\/revisions"}],"predecessor-version":[{"id":2114,"href":"https:\/\/spinor.info\/weblog\/index.php?rest_route=\/wp\/v2\/posts\/2113\/revisions\/2114"}],"wp:attachment":[{"href":"https:\/\/spinor.info\/weblog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2113"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/spinor.info\/weblog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2113"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/spinor.info\/weblog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2113"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}