he got tired of punching people in the back of the head as they ran away from street fights. the dude really had it together, sometimes a fluke of design happens and someone derives a framework that simplifies and streamlines centuries of pugilistic assumptions. spending decades of my own time pursuing this specific ideal, i realized that Bruce had it right and deserves more credit for his revolutionary approach that i still havent been able to find fault in.
my bet is on an assessor mis-scanning an ip range during a scheduled network assessment. having been in those trenches, this is how it was firmly explained to me every week when tasks were delegated: "double and triple-check all your target ip addresses. we don't want someone outside the network complaining about a scan, that's a reportable incident and makes us look like douches when we are trying to get new business with the fed client."
breathless exclamations of relative ease of exploit execution is just subjective editorial flair, for those keeping track of the well-intended neophyte observations.
The entire thing comes off subjective. In modern journalism courses don't they preach about avoiding that pitfall?
Unless everyone in tech writing wants to be Hunter Thompson by breaking all the rules.
if you give a man a URL he will surf for a day, if you tell him to go to adsbexchange and set up his own filter to see ultra-cool stuff, he upvotes the source.
while i love the platform, fr24 filters results so you arent likely to see ultra-cool stuff. adsbexchange does a more open job of not filtering submitted data.
this can mainly be attributed to nationalization, the chinese government bringing all traditional elements under a single authorized form of martial arts.
so, real esoteric arts will eventually disappear in favor of state-sanctioned 'wushu', which is still effective, just not as rare and revered, and more of a dance than something readily applicable to fighting or defense.