In the wake of China’s massive telecom breach, a radical "breach-assumed" approach could make such attacks pointless.