[167286] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: =?utf-8?B?U29tZW9uZeKAmXMgQmVl?= =?utf-8?Q?n?= Siphoning Data

daemon@ATHENA.MIT.EDU (Stephane Bortzmeyer)
Fri Dec 6 15:13:33 2013

Date: Fri, 6 Dec 2013 21:10:36 +0100
From: Stephane Bortzmeyer <bortzmeyer@nic.fr>
To: Brandon Galbraith <brandon.galbraith@gmail.com>
In-Reply-To: <CADE4tYWJ--dhEQGfi1SfQ_g4PUZtHu9t_m04Rn2Y6pRzMZtfPA@mail.gmail.com>
Cc: NANOG list <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On Fri, Dec 06, 2013 at 12:39:16PM -0600,
 Brandon Galbraith <brandon.galbraith@gmail.com> wrote 
 a message of 43 lines which said:

> If your flows are a target, or your data is of an extremely
> sensitive nature (diplomatic, etc), why aren't you moving those bits
> over something more private than IP (point to point L2,

And how can you be sure that the P2P L2 has not been provisioned as
just an unencrypted virtual link over the regular Internet? A
dedicated low-layers circuit is expensive...

No, end-to-end encryption is the only serious solution.


home help back first fref pref prev next nref lref last post