[168001] in North American Network Operators' Group
Re: Open source hardware
daemon@ATHENA.MIT.EDU (=?UTF-8?Q?Dani=C3=ABl_W=2E_Crompto)
Sat Jan 4 08:05:21 2014
In-Reply-To: <52C74C9B.30802@bitfreak.org>
From: =?UTF-8?Q?Dani=C3=ABl_W=2E_Crompton?= <daniel.crompton@gmail.com>
Date: Sat, 4 Jan 2014 14:04:40 +0100
To: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
On 4 January 2014 00:49, Darren Pilgrim <nanog@bitfreak.org> wrote:
> Why would you think other platforms would be any safer? The NSA plants
> those bugs with interdiction operations. They could similarly install
> eavesdroppers in the USB/serial links of your KVM switches and terminal
> servers and capture your root/admin/console passwords.
In my opinion there is a clear difference between being targeted and having
a backdoor in your network equipment by default.
D.
--=20
Dani=C3=ABl W. Crompton <daniel.crompton@gmail.com>
<http://specialbrands.net/>
<http://specialbrands.net/>
http://specialbrands.net/
<http://twitter.com/webhat>
<http://www.facebook.com/webhat><http://plancast.com/webhat><http://www.lin=
kedin.com/in/redhat>