[163683] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: huawei

daemon@ATHENA.MIT.EDU (Eugen Leitl)
Fri Jun 14 02:48:18 2013

Date: Fri, 14 Jun 2013 08:47:46 +0200
From: Eugen Leitl <eugen@leitl.org>
To: nanog@nanog.org
In-Reply-To: <CAPhg-wS+ZHVnRp4_3WorTEewdRu5csbnYnrn_J-mMYD-OUGuag@mail.gmail.com>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On Thu, Jun 13, 2013 at 10:34:28AM -0600, Phil Fagan wrote:
> Yeah, I can't imagine there is any real magic there...mystical protocol not
> seen over transport.

Compromised NICs can leak info through side channels (timing) but
it's too low bandwidth. For end user devices with backdoors
(remote vulnerabilities are like sloppy backdoors) you could
get away with 'it's just part of a botnet', perhaps.


home help back first fref pref prev next nref lref last post