У нас вы можете посмотреть бесплатно The Malware That Physically Destroyed Iran's Nuclear Program: Stuxnet или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
In 2007, a weapon unlike anything the world had ever seen was smuggled into Iran's most heavily guarded nuclear facility. It wasn't a bomb. It had no moving parts. It was code — and it physically destroyed over 1,000 uranium enrichment centrifuges spinning at supersonic speed, while every screen in the building showed everything was perfectly normal. Stuxnet was the world's first true cyber weapon, a joint operation between the United States and Israel that cost an estimated $1–$2 billion to develop, exploited 4 zero-day vulnerabilities simultaneously, and was smuggled into an air-gapped underground bunker by a Dutch intelligence mole whose identity remained secret for over 15 years. The malware recorded 21 seconds of normal data and replayed it on loop so operators never saw what was happening. Engineers were fired. The head of Iran's atomic energy program was forced to resign. They blamed each other. They never suspected software. Then the weapon escaped. And the chain of consequences that followed — from the Shadow Brokers leak to WannaCry to NotPetya — would end up causing more damage to the countries that built it than to the country it targeted. This is the full story of Operation Olympic Games, the people who built it, the researchers who exposed it, and the question nobody wanted to answer: what happens when the most powerful digital weapon ever created gets loose on the open internet? This video is a researched documentary based on publicly available reporting, academic papers, government disclosures, and expert analysis. It is intended for educational and informational purposes only. All facts presented have been cross-referenced across multiple credible sources including the New York Times, IEEE Spectrum, Symantec's technical dossier, and the Institute for Science and International Security. No classified material was used in the production of this video.