Phish Quotes

We've searched our database for all the quotes and captions related to Phish. Here they are! All 10 of them:

Every Betrayal begins with trust-Phish Dream as if you'll live forever, live as if you'll die today-James Dean Laugh as much as you breathe and love as long as you live-Anonymous
Brian Jacques (Redwall (Redwall, #1))
Each betrayal begins with trust.
Phish (Phish - Farmhouse)
When you're there, I sleep lengthwise. And when you're gone, I sleep diagonal in my bed.
Phish
Each betrayal begins with trust
Phish (Phish - Farmhouse)
Every conceivable layer of the election process is completely riddled with vulnerabilities, so yes, hacking elections is easy!
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
Deduct the carrots from your pay, you worthless, swampy fool. from Cavern
Phish (Phish - The Story of the Ghost)
A Nation State or Cyber-Mercenary won’t hack e-voting machines one by one. This takes too long and will have minimal impact. Instead, they’ll take an easier approach like spear phishing the manufacturer with malware and poison the voting machine update pre-election and allow the manufacturer to update each individual machine with a self-deleting payload that will target the tabulation process.
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
The economic system is filled with trickery, and everyone needs to know that. We all have to navigate this system in order to maintain our dignity and integrity, and we all have to find inspiration to go on despite craziness all around us. We wrote this book for consumers, who need to be vigilant against a multitude of tricks played on them. We wrote it for businesspeople, who feel depressed at the cynicism of some of their colleagues and trapped into following suit out of economic necessity. We wrote it for government officials, who undertake the usually thankless task of regulating business. We wrote it for the volunteers, the philanthropists, the opinion leaders, who work on the side of integrity. And we wrote it for young people, looking ahead to a lifetime of work and wondering how they can find personal meaning in it. All these people will benefit from a study of phishing equilibrium—of economic forces that build manipulation and deception into the system unless we take courageous steps to fight it. We also need stories of heroes, people who out of personal integrity (rather than for economic gain) have managed to keep deception in our economy down to livable levels. We will tell plenty of stories of these heroes.
George A. Akerlof (Phishing for Phools: The Economics of Manipulation and Deception)
The name UNIX began as a pun: because early versions of the operating system supported only one user—Ken Thompson—Peter Neumann, a security researcher at Stanford Research International, joked that it was an “emasculated Multics,” or “UNICS.” The spelling was eventually changed to UNIX.
Scott J. Shapiro (Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks)
The problem with solutionism... It assumes that rationality has the tools to solve every problem. ... We think problems are decidable because we only see the decidable ones. We don't see the infinite number of problems we can't solve because it's so difficult even to describe them. We are finite creations and can solve problems only if we can develop algorithms --finite procedures-- for reaching the correct answers. Most problems do not have solutions that are reducible to finite procedures. To assume the world is built so we can figure it out is absurd.
Scott J. Shapiro (Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks)