Binding Hook
banner
bindinghook.bsky.social
Binding Hook
@bindinghook.bsky.social
Expert commentary on emerging tech and security. Send us your article ideas at [email protected]. Project from @VirtualRoutes.bsky.social
For a little more on cyber operations and deception, read @maxwsmeets.bsky.social’s exploration of the ‘sophisticated’ cyber attacks:
bindinghook.com/the-magic-of...
The magic of sophisticated cyber attacks - Binding Hook
To truly measure sophistication, we need to look past the technical and consider the broader elements of cyber operations
bindinghook.com
January 9, 2026 at 10:12 PM
For more, read their earlier Binding Hook analysis of cyber persistence theory in the Russia-Ukraine war:
#cyberpersistencetheory #cybercontingencycampaigning

bindinghook.com/cyber-persis...
Cyber Persistence Theory in the Russo-Ukrainian war - Binding Hook
The authors of Cyber Persistence Theory assess how it stacks up in the Ukraine conflict
bindinghook.com
January 5, 2026 at 10:51 PM
Reposted by Binding Hook
However, readers spent the longest time on Gatra Priyandita and Arindrajit Basu’s examination of India and Indonesia’s approaches to attribution:

bindinghook.com/india-and-in...
India and Indonesia’s approach to publicly attributing cyberattacks? No naming, no shaming
India and Indonesia’s reticent approach to publicly attributing cyberattacks is the result of strategic culture, insufficient technical capacity, and the lack of clear returns
bindinghook.com
December 30, 2025 at 12:32 AM
Reposted by Binding Hook
Our most read piece in 2025 was Jack Goldsmith’s Binding Hook-Munich Security Conference Essay Prize Competition entry ‘Ghosts in the machine and the hidden dangers of autopoiesis’

bindinghook.com/ghosts-in-th...
Ghosts in the machine and the hidden dangers of autopoiesis - Binding Hook
The foundations on which the digital world is predicated are brittle. Carelessly introducing AI-generated code into this structure risks further widening its fault lines
bindinghook.com
December 30, 2025 at 12:31 AM
However, readers spent the longest time on Gatra Priyandita and Arindrajit Basu’s examination of India and Indonesia’s approaches to attribution:

bindinghook.com/india-and-in...
India and Indonesia’s approach to publicly attributing cyberattacks? No naming, no shaming
India and Indonesia’s reticent approach to publicly attributing cyberattacks is the result of strategic culture, insufficient technical capacity, and the lack of clear returns
bindinghook.com
December 30, 2025 at 12:32 AM
Our most read piece in 2025 was Jack Goldsmith’s Binding Hook-Munich Security Conference Essay Prize Competition entry ‘Ghosts in the machine and the hidden dangers of autopoiesis’

bindinghook.com/ghosts-in-th...
Ghosts in the machine and the hidden dangers of autopoiesis - Binding Hook
The foundations on which the digital world is predicated are brittle. Carelessly introducing AI-generated code into this structure risks further widening its fault lines
bindinghook.com
December 30, 2025 at 12:31 AM
Reposted by Binding Hook