America tells private firms to “hack back”
Security responsibility & limits
- Some argue insecure systems should be treated as fair game and owners held liable, but others counter that no usable system can be perfectly secure; even diligent operators can be compromised (e.g., cloud 0‑days).
- Frustration centers on egregious negligence going unpunished, not on every breach implying fault.
- There’s debate over how far responsibility runs when core dependencies (like major cloud providers or identity platforms) are flawed.
Defense against nation‑state actors
- Commenters question whether anything short of “billions of dollars” can protect, especially for safety‑critical devices.
- Others argue you can’t “avoid paying for security” and advocate strong internal security/reliability orgs and secure-by-default platforms so product teams don’t roll their own.
Hack‑back feasibility & attribution
- Many highlight that attribution is hard even for intelligence agencies; attackers route through compromised hosts and multiple jurisdictions.
- Risk of “hacking back” the wrong party (another victim, cloud provider, hospital, security researcher) is seen as high.
- Some foresee misidentified “hackers” being DDoS’d or exploited by overeager corporate defenders.
Privatized cyber‑warfare & ‘letters of marque’
- Strong concern that encouraging hack back effectively licenses private cyber‑armies / vigilante justice.
- Analogies drawn to letters of marque and privateers: state outsourcing coercive force to profit‑seeking actors.
- Objections center on governments losing monopoly on (digital) violence and the lack of due process.
Effectiveness, incentives, and escalation
- Offense is seen as often easier and cheaper than defense, but hacking back rarely recovers data and may just escalate conflict, especially against state‑linked groups.
- Some note boutique offensive‑security shops already operate with tacit state tolerance; others see that as a problem being normalized, not solved.
Political and ethical worries
- Several see a pattern of legitimizing extra‑legal action—digital and physical—when it aligns with the current administration’s interests.
- Fears include false‑flag operations, friendly‑fire cyber “wars” between misattributing defenders, and broader “cyberpunk” style erosion of rule of law.