[168016] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Open source hardware

daemon@ATHENA.MIT.EDU (Arnd Vehling)
Sun Jan 5 04:16:11 2014

Date: Sun, 05 Jan 2014 17:15:48 +0800
From: Arnd Vehling <av@nethead.de>
To: =?UTF-8?B?IkRhbmnDq2wgVy4gQ3JvbXB0b24i?= <daniel.crompton@gmail.com>
In-Reply-To: <CALKmEuDoSwWwqq8+7sdGR2DG6GjqU-=QvFBfYt+wR4-mbRCHLA@mail.gmail.com>
Cc: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

Hi,

On 04.01.2014 21:07, Daniƫl W. Crompton wrote:
> To my surprise I am seeing a theme fatalistic acceptance in this thread,

thats not really suprising. Then most poeple dont understand the 
implications "this" has.

> A number have mentioned that if you are targeted there is little you can
> do, and this is something that I agree with to a certain extent.

Here i agree too. But i think it should be in possible to overload them 
by mass-creating fake data and honey pots. They dont have endless 
resources especially when it comes to decrypting. So, if just 10% of the 
"aware persons" start firing up "NSA honeypots" they get a resource 
problem and will fail at selecting targets.

// Arnd


home help back first fref pref prev next nref lref last post