[119897] in North American Network Operators' Group
RE: news from Google
daemon@ATHENA.MIT.EDU (Deepak Jain)
Thu Dec 3 14:40:24 2009
From: Deepak Jain <deepak@ai.net>
To: Stefan <netfortius@gmail.com>, "bclark@spectraaccess.com"
<bclark@spectraaccess.com>
Date: Thu, 3 Dec 2009 14:36:09 -0500
In-Reply-To: <ffe0b3100912031126ucd26890s2ae6815283758638@mail.gmail.com>
Cc: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
> I think of this as an obvious (not necessarily beneficial for all, of
> course) step for a company which lives out of advertisement - i.e. what
> if
> they could capture your habits for browsing at the FQDN-to-IP time -
> wouldn't that add more to their knowledge base?
>=20
I think there are amazing opportunities to data mine and prevent fraud if y=
ou can get a percentage of your users using this.=20
I'm really excited about the structured attacks that will be run against th=
is thing (cache poisoning... and nastier)... if (for example) when their (o=
r someone's) toolbar is installed, they ask if you'd like to use their "imp=
roved" dns service [perhaps they have the whole universe cached to reduce l=
ookup times]. You'd sign up.
And as the wave of software updates proceeds... well, talk about all your e=
ggs in one basket.
Smart ISPs will have an ACL ready to hijack external DNS requests for their=
whole network in the (inevitable) event something *bad* happens one day an=
d you need to restore service to your customers faster than they can figure=
out how to fix it themselves. Just a thought.
Deepak