[167874] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: NSA able to compromise Cisco, Juniper, Huawei switches

daemon@ATHENA.MIT.EDU (sthaug@nethelp.no)
Tue Dec 31 08:46:07 2013

Date: Tue, 31 Dec 2013 14:45:46 +0100 (CET)
To: rps@maine.edu
From: sthaug@nethelp.no
In-Reply-To: <CALFTrnOtGF+Juc54dQcOEfCVC-cmHb_L6bc6h_HG5_6-Y7BaMA@mail.gmail.com>
Cc: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

> I think there needs to be some clarification on how these tools get used,
> how often they're used, and if they're ever cleaned up when no longer part
> of an active operation.  Of course we'll never get that.

Highly unlikely, I'd say.

> The amount of apologists with the attitude "this isn't a big deal, nothing
> to see here, the NSA does this kind of thing" is kind of shocking for this
> community; especially with the information that's been released over the
> past few months.
> 
> This whole backdoor business is a very, very, dangerous game.

It *is* a big deal. And if you want to get even more scared, listen to
Jacob Appelbaum's talk at the CCC here:

      http://www.youtube.com/watch?v=b0w36GAyZIA

Steinar Haug, Nethelp consulting, sthaug@nethelp.no


home help back first fref pref prev next nref lref last post