cthia wrote:There certainly should be a concern for security. And I considered that. But then I quickly realized that if access to the program can be attained, then the program is not the problem. General security is the problem. As long as there aren't any security issues with the program itself.
Issues such as dangling pointers, memory leaks, dead variables, bugs, defects, state.
You haven´t thought it through enough. Having the face emulation software allowed internally is an enabling technology. You don´t need any kind of special access to exploit it.
Worse however, is that if someone is using a more advanced emulator, or something similar, the person on the receiving end cannot nearly as easily realise something is being used for spoofing rather than for convenience, if it´s "ok" to use it for convenience.
If it´s not "ok" to use it at all internally, then instantly if someone see that something like that IS being used, it will cause alarms to go off, personal or tech-based or both.
This is why you NEVER EVER install certain types of software in a secure environment.
The problem with a program like this is that the normal use of the program by itself is a security risk, it doesn´t matter if in itself it has zero vulnerabilities.
If you were to use this in "your" ships, ok, then i aquire a copy. Then make an alternate version of that which mimics the original software enough that internal comm software wont see the difference, then i either need a few moles or someone to stuff some extra automated software onboard, doesn´t need to be in any of the high security areas of the systems even.
After that, i can wreak havoc in your fleets.
At least once, and probably a few times.
I don´t need more than that.
And that´s just the most blatant exploit.
What if i had those programs "fixed" to suddenly start switching people with uniforms out for nude pornstars(many options for various replacements here)? Set to do it at the right time and action, the amount of annoyance and/or temporary confusion it could cause is quite major.
Or it could be used for personal attacks on the most competent enemy leaders.
I also have a fair idea how such a program could be used for transmitting information covertly. I´ll keep the "how" for that to myself though.
And i already know that it´s "not that easy", but the point here isn´t that it easy, but that YOU are making it POSSIBLE for your enemies to exploit your own software.