I thought the author's idea that it is prohibitively difficult to create exploits in a vacuum, and need to know the specific configuration of your adversary's systems in order to be able to attack or counter-attack was interesting.
If you think it is appropriate for your nation to maintain the ability to respond, then, pragmatically, you support either your nation intruding in other's systems or your nation maintaining a weak deterrent response.