What type of computer flaw does the book open by focusing on?
A zero-day vulnerability
What famous cyberweapon is discussed as a turning point in cyberwarfare?
Stuxnet
What kind of people discover and sell zero-day vulnerabilities?
Hackers or security researchers
What agency is frequently connected to stockpiling cyber vulnerabilities?
The NSA
What is the central topic of these chapters?
Cyber warfare and zero-day vulnerabilities
What does the term "zero-day" mean?
A vulnerability unknown to the software maker and not yet patched
What country’s nuclear program was Stuxnet designed to sabotage?
Iran
Who are the biggest buyers of zero-day exploits?
Governments and intelligence agencies
What happens when leaked exploits escape into the public?
They can be used by criminals or hostile nations
Daily Double
What invisible threat connects all five chapters?
Undisclosed software vulnerabilities
Which industry revolves around buying and selling zero-day exploits?
The vulnerability or exploit market
What made Stuxnet different from earlier cyberattacks?
It caused physical damage using software
Why are zero-day exploits so valuable?
They allow undetected access to systems
What does the book suggest happens when governments hoard exploits?
Everyone becomes less safe
What role do governments play throughout the book?
They buy, use, and hide cyber weapons
What is the main danger of keeping zero-day vulnerabilities secret?
They can be used to secretly attack systems and infrastructure
Who is believed to have created Stuxnet?
The United States and Israel
What ethical dilemma is raised about selling exploits?
Selling them can put innocent people at risk
What real-world consequence can result from leaked cyber weapons?
Global cyberattacks and infrastructure damage
What is the main warning the author gives readers?
Cyber weapons can spiral out of control
What global risk is introduced in the opening chapters as being tied to cyber weapons?
The potential collapse of global security or critical infrastructure
Why did Stuxnet change how nations viewed cyber weapons?
It proved cyberattacks could cause real-world destruction
What is the main conflict between security and secrecy in this chapter?
Whether vulnerabilities should be disclosed or weaponized
What question does the chapter force readers to ask about government power?
Who is being protected — citizens or national interests?
According to the book, why could cyber warfare “end the world” as we know it?
Because it threatens global systems without clear rules or limits