[110327] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Security team successfully cracks SSL using 200 PS3's and MD5

daemon@ATHENA.MIT.EDU (Etaoin Shrdlu)
Fri Jan 2 19:42:03 2009

Date: Fri, 02 Jan 2009 16:43:53 -0800
From: Etaoin Shrdlu <shrdlu@deaddrop.org>
To: Nanog <nanog@nanog.org>
In-Reply-To: <77e4079b0901021537w72b5eb2dx379b70b1b2b54211@mail.gmail.com>
Errors-To: nanog-bounces@nanog.org

Neil wrote:

>>Do people here really so quickly forget things?  There was a talk on
>>Carnivore given in 2000 at NANOG 20, IIRC, and I believe that one of the
>>instigating causes of that talk was problems that Earthlink had experienced
>>when the FBI had deployed Carnivore there.

> Naturally.  The NSA isn't filled with theorists who want to get the
> job done the "right" way.  They have a mission to fulfill, and they'll
> use whatever tool works to get it done.

Just a slight point of order, here. Carnivore (and its successor, 
DCS1000) were used by, and developed by, the FBI. The NSA use other 
stuff. Let's get back to reality, anyway.

-- 
Debugging is twice as hard as writing the code in the first place.
Therefore, if you write the code as cleverly as possible, you are,
by definition, not smart enough to debug it.
   Brian W. Kernighan


home help back first fref pref prev next nref lref last post