On 23/06/2013, at 1:21 PM, William Allen Simpson wrote:

> What security protocols are folks using to protect SONET/SDH?
> At what speeds?


"Excuse me NSA, can I have export approval for one KG-530 SDH encryptor?" What 
are the odds :-)

And how would we know that the "export model" isn't simply providing a more 
convenient backdoor for the NSA?

-glen

Reply via email to