[163683] in North American Network Operators' Group
Re: huawei
daemon@ATHENA.MIT.EDU (Eugen Leitl)
Fri Jun 14 02:48:18 2013
Date: Fri, 14 Jun 2013 08:47:46 +0200
From: Eugen Leitl <eugen@leitl.org>
To: nanog@nanog.org
In-Reply-To: <CAPhg-wS+ZHVnRp4_3WorTEewdRu5csbnYnrn_J-mMYD-OUGuag@mail.gmail.com>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
On Thu, Jun 13, 2013 at 10:34:28AM -0600, Phil Fagan wrote:
> Yeah, I can't imagine there is any real magic there...mystical protocol not
> seen over transport.
Compromised NICs can leak info through side channels (timing) but
it's too low bandwidth. For end user devices with backdoors
(remote vulnerabilities are like sloppy backdoors) you could
get away with 'it's just part of a botnet', perhaps.