[163708] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: huawei

daemon@ATHENA.MIT.EDU (Michael Thomas)
Fri Jun 14 14:57:59 2013

Date: Fri, 14 Jun 2013 11:57:30 -0700
From: Michael Thomas <mike@mtcc.com>
To: Scott Helms <khelms@zcorum.com>
In-Reply-To: <CAMrdfRwicarWTRAFD22B4n63AUTwDcJLHYzbt-8w+sGCYwjZdw@mail.gmail.com>
Cc: NANOG <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On 06/14/2013 11:35 AM, Scott Helms wrote:
> In $random_deployment they have no idea what the topology is and odd behavior is *always *noticed over time. The amount of time it would take to transmit useful information would nearly guarantees someone noticing and the more successful the exploit was the more chance for discovery there would be. 

As a software developer for many, many years, I can guarantee you
that is categorically wrong. I'd venture to say you probably don't even
notice half. And that's for things that are just bugs or misfeatures.
Something that was purposeful and done by people who know what
they're doing... your odds in Vegas are better IMO.

Mike, who's seen way too many "how in the hell did that ever work?"


home help back first fref pref prev next nref lref last post