[167874] in North American Network Operators' Group
Re: NSA able to compromise Cisco, Juniper, Huawei switches
daemon@ATHENA.MIT.EDU (sthaug@nethelp.no)
Tue Dec 31 08:46:07 2013
Date: Tue, 31 Dec 2013 14:45:46 +0100 (CET)
To: rps@maine.edu
From: sthaug@nethelp.no
In-Reply-To: <CALFTrnOtGF+Juc54dQcOEfCVC-cmHb_L6bc6h_HG5_6-Y7BaMA@mail.gmail.com>
Cc: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
> I think there needs to be some clarification on how these tools get used,
> how often they're used, and if they're ever cleaned up when no longer part
> of an active operation. Of course we'll never get that.
Highly unlikely, I'd say.
> The amount of apologists with the attitude "this isn't a big deal, nothing
> to see here, the NSA does this kind of thing" is kind of shocking for this
> community; especially with the information that's been released over the
> past few months.
>
> This whole backdoor business is a very, very, dangerous game.
It *is* a big deal. And if you want to get even more scared, listen to
Jacob Appelbaum's talk at the CCC here:
http://www.youtube.com/watch?v=b0w36GAyZIA
Steinar Haug, Nethelp consulting, sthaug@nethelp.no