Why can't they just move these conferences out of the US? Dmitry Sklyarov was arrested at one of these Vegas hacker conventions, in case people have forgotten after all these years. There are many other countries where these conferences could be held, and where all this security BS isn't much of a factor.
You mention Dmitry Sklyarov but more recently Marcus Hutchins (MalwareTech) has been also arrested by the FBI following its appearance at Blackhat or Defcon
The US increases its generating capacity by about 4% per year. (50GW added per year, 1.3TW total).
EV's are a very small part of demand increase.
I don't think it is economically viable to maintain two sets of power distribution (electricity and petrol) at the same time so countries will probably "push out" traditionnal petrol stations once they think EV distribution is okay enough
While I agree that European countries should start to take their defense seriously I don't see how you fault US support of Ukraine.
And honestly it was the European's fault to believe in this pipe dream.
So tools to spy on your employees?
Same thing with corporate internet, you accept to use the corp proxy DNS and firewall (which all logs infos) to browse the internet instead of using a separate GSM endpoint to circumvent the company's surveillance.
It means for example being systematically in cc for mail exchanged and being in every teams discord channel. The new social contract when working remotely is "you (the manager) can't look over my shoulder to see if I'm working correctly so I (the employee) need to show proofs of communication instead".
I've seen too many juniors working remotely that just don't communicate on their day-to-day work, and completely blindside their manager/coworkers which understandably freaks out.
Then you need remote "telemetry", meaning access either to chat messages, email, tickets, etc. and a way to process it at scale (without reading everything) in order to defuse sticky situations based on partial infos or misunderstandings. Such tools can be panopticon-y so you need to explicitly specify which convos "spaces" are private and which are subject to management interference.
This project is fine for the author's self-improvement on how SSH is implemented, but personally I advise against using it in a production environment.
Looks like NSA still hasn't forgiven Kaspersky for exposing STUXNET [1]. It seems that this latest attack on Kaspersky was expensive. Losing 4 zerodays must have been painful. It's also possible that Israel and Unit 8200 [2] was behind this but my money's on the NSA.
[1] https://eugene.kaspersky.com/2011/11/02/the-man-who-found-st...
[2] https://www.washingtonpost.com/world/national-security/israe...
The fact that the attacker has almost a full-chain but no persistence screams to me "second fiddle", probably a nation state that have access to 0-days brokers but no in-house engineering.