[168016] in North American Network Operators' Group
Re: Open source hardware
daemon@ATHENA.MIT.EDU (Arnd Vehling)
Sun Jan 5 04:16:11 2014
Date: Sun, 05 Jan 2014 17:15:48 +0800
From: Arnd Vehling <av@nethead.de>
To: =?UTF-8?B?IkRhbmnDq2wgVy4gQ3JvbXB0b24i?= <daniel.crompton@gmail.com>
In-Reply-To: <CALKmEuDoSwWwqq8+7sdGR2DG6GjqU-=QvFBfYt+wR4-mbRCHLA@mail.gmail.com>
Cc: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
Hi,
On 04.01.2014 21:07, Daniƫl W. Crompton wrote:
> To my surprise I am seeing a theme fatalistic acceptance in this thread,
thats not really suprising. Then most poeple dont understand the
implications "this" has.
> A number have mentioned that if you are targeted there is little you can
> do, and this is something that I agree with to a certain extent.
Here i agree too. But i think it should be in possible to overload them
by mass-creating fake data and honey pots. They dont have endless
resources especially when it comes to decrypting. So, if just 10% of the
"aware persons" start firing up "NSA honeypots" they get a resource
problem and will fail at selecting targets.
// Arnd