On 01/05/2020 19:13, Eric Tykwinski wrote:
> how the hell are they going to get power up there for dependability.
> Solar power sure is a great option, but I was under the assumption
> that repairs will be hell to put it bluntly.
> Batteries in that cold of a climate is also a regular trip. which
d
>Cc: John Levine ; nanog@nanog.org
>Subject: Re: Huawei on Mount Everest
>
>Honestly, being an amateur rock climber, I’m in the same boat, but how
>the hell are they going to get power up there for dependability.
>Solar power sure is a great option, but I was under the assumption tha
You're all missing the point... We can now watch cat videos from the
top of Everst. C'mon! Shouldn't that rank among the greatest of man's
achievements?
On Fri, May 01, 2020 at 01:57:42PM -0400, John Levine wrote:
> In article
> you
> write:
> >-=-=-=-=-=-
> >
>
On May 1, 2020, at 11:07 AM, Aaron Gould wrote:
> You made me curious...
>
> https://en.wikipedia.org/wiki/List_of_people_who_died_climbing_Mount_Everest
>
> wow, I guess it would be great to be able to use cell/gps technology to
> communicate with and track a lost/endangered climber
On Fri, May 1, 2020 at 11:01 AM John Levine wrote:
> Given how dangerous the ascent is, I would think it would be a good
> thing for climbers to be able to check in and say whether they are OK.
Hi John,
Climbers who care rent or buy satphones and beacons. They're mostly
based on low earth orbit
ne
> Sent: Friday, May 1, 2020 12:58 PM
> To: nanog@nanog.org
> Subject: Re: Huawei on Mount Everest
>
> In article
> you
> write:
>> -=-=-=-=-=-
>>
>> https://telecoms.com/504051/huawei-and-china-mobile-stick-a-5g-base-station-on-mount-everest/
>>
>&
=gvtc@nanog.org] On Behalf Of John
Levine
Sent: Friday, May 1, 2020 12:58 PM
To: nanog@nanog.org
Subject: Re: Huawei on Mount Everest
In article
you write:
>-=-=-=-=-=-
>
>https://telecoms.com/504051/huawei-and-china-mobile-stick-a-5g-base-station-on-mount-everest/
>
>Wh
In article
you write:
>-=-=-=-=-=-
>
>https://telecoms.com/504051/huawei-and-china-mobile-stick-a-5g-base-station-on-mount-everest/
>
>Why dont we leave the Everest alone? OTOH, we can now have tiktok
>videos and latest instagram posts from the summit.
Given how dangerous the ascent is, I would
On Fri, May 1, 2020 at 7:20 AM Glen Kent wrote:
>
> https://telecoms.com/504051/huawei-and-china-mobile-stick-a-5g-base-station-on-mount-everest/
>
> Why dont we leave the Everest alone? OTOH, we can now have tiktok videos and
> latest instagram posts from the summit.
>
> Yippe. Just when you
You could try cross posting to UKNOG since BT use Huawei in their DSLAMs.
http://lists.uknof.org.uk/cgi-bin/mailman/listinfo/uknof/
On 7 May 2015 21:18, ML m...@kenweb.org wrote:
On 5/7/2015 2:25 PM, Daniel Corbe wrote:
Colton Conor colton.co...@gmail.com writes:
The other thread about the
Colton Conor colton.co...@gmail.com writes:
The other thread about the Alcatel-Lucent routers has been pleasantly
delightful. Our organization used to believe that Juniper, Cisco, and
Brocade were the only true vendors for carrier grade routing, but now we
are going to throw Alcatel-Lucent
On 5/7/2015 2:25 PM, Daniel Corbe wrote:
Colton Conor colton.co...@gmail.com writes:
The other thread about the Alcatel-Lucent routers has been pleasantly
delightful. Our organization used to believe that Juniper, Cisco, and
Brocade were the only true vendors for carrier grade routing, but now
And a bunch of ban's around Oct 2013 from a wide variety of
countries...
you mean fear of implants as there are in cisco products?
Was more a statement of fact.
As if it was warranted. I do not know.
-
Alain Hebertaheb...@pubnix.net
PubNIX Inc.
50 boul. St-Charles
P.O. Box 26770 Beaconsfield, Quebec H9W 6G7
Tel: 514-990-5911 http://www.pubnix.netFax:
To be fair, they've fixed one of the big concerns that were raised
with them a couple of years ago: google for huawei + psirt now
actually returns usable results. No idea how well the interface with
them works when you're actually trying to report a vulnerability
(maybe someone can speak up).
Well,
Wasn't the Huawei CEO that stated that they where not interested
into the US market.
( And by proxy ... the Canadian one )
http://www.theregister.co.uk/2013/04/23/huawei_not_interested_in_us/
And a bunch of ban's around Oct 2013 from a wide variety of countries...
Huawei has sales personal in the US and does sell here. See
http://huawei.com/us/about-huawei/contact-us/index.htm
And for a more recent Huawei management statement, see
http://usa.chinadaily.com.cn/epaper/2014-04/28/content_17470474.htm
Huawei executive says it still seeks US sales
Thanks,
So I'm clear, its not just a low bit rate argument. Its a low bit rate,
combined with little spare horsepower (CPU RAM), little non-volatile
storage, and a deluge of information to sort through in order to find
something useful. If core routers weren't in the core, where they have
access to
On Mon, Jun 17, 2013 at 7:38 AM, Tony Patti t...@swalter.com wrote:
Thanks, I liked your pointer to the SDR.
But can I ask you for a bit more info about your statement
where oscilloscopes and frequency analysis is available to anyone with some
Google-fu
We don't need as much test equipment
now THAT would be a cool project!
On Tue, Jun 18, 2013 at 2:25 PM, Jazz Kenny trapperjohn...@gmail.comwrote:
On Mon, Jun 17, 2013 at 7:38 AM, Tony Patti t...@swalter.com wrote:
Thanks, I liked your pointer to the SDR.
But can I ask you for a bit more info about your statement
where
There's already code out there for the GNURadio project's software defined
radio infrastructure that supports some very basic LTE analysis using a
$20 or less USB DTV tuner stick!! Only a matter of time before some radio
devices with a lot more bandwidth become affordable and easily
On Tue, Jun 18, 2013 at 02:31:37PM -0600, Phil Fagan wrote:
now THAT would be a cool project!
(I missed the beginnig of this thread; sorry if this is a repeat.)
There was the fellow demonstrating a spoofed 2G GSM tower at DefCon
recently:
Jay,
That's a very interesting point about the 4G puckdo you mean modulating
data over side-lobes? To your point, I as a subscriber would have no way
every knowing that unless of course I hooked up my specanny and started to
try to decode the sidelobesI imagine most folks don't do that (
- Original Message -
From: Phil Fagan philfa...@gmail.com
That's a very interesting point about the 4G puckdo you mean
modulating
data over side-lobes? To your point, I as a subscriber would have no
way
every knowing that unless of course I hooked up my specanny and
started to
Why is it so difficult? Hiding communications is an intriguing subject - My
ears perked up a bit at the Multics remark - Morse is something that
probably never would have even crossed my mind.
EDIT: Okay, now it's sent to the list. DOHF!
On Sun, Jun 16, 2013 at 1:03 PM, Jazz Kenny
: Sun, 16 Jun 2013 13:05:46 -0700
Subject: Re: huawei
From: trapperjohn...@gmail.com
To: nanog@nanog.org
Why is it so difficult? Hiding communications is an intriguing subject - My
ears perked up a bit at the Multics remark - Morse is something that
probably never would have even crossed my mind.
If it was that easy why did the feds come up with that bts spoofed?
Sent from my Mobile Device.
Original message
From: Jay Ashworth j...@baylink.com
Date: 06/16/2013 12:46 PM (GMT-08:00)
To: NANOG nanog@nanog.org
Subject: Re: huawei
- Original Message -
From: Phil
exported from the
Game into an external program.
Greetings
Chris
---
-= Amat Victoria Curam =-
Date: Sun, 16 Jun 2013 13:05:46 -0700
Subject: Re: huawei
From: trapperjohn...@gmail.com
To: nanog@nanog.org
Why is it so difficult? Hiding communications is an intriguing subject
On 6/14/13, Scott Helms khe...@zcorum.com wrote:
Is it possible? Yes, but it's not feasible because the data rate would be
too low. That's what I'm trying to get across. There are lots things that
can be done but many of those are not useful.
[snip]
I agree that the data rate will be low. I
On Fri, Jun 14, 2013 at 07:51:22PM -0400, Scott Helms wrote:
Really? In a completely controlled network then yes, but not in a
production system. There is far too much random noise and actual latency
for that to be feasible.
The coding used for the stegano side channel can be made quite
On Fri, Jun 14, 2013 at 08:34:49PM -0400, Scott Helms wrote:
Is it possible? Yes, but it's not feasible because the data rate would be
too low. That's what I'm trying to get across. There are lots things that
can be done but many of those are not useful.
I could encode communications in
With the CPU and RAM available in a router that has to actually continue
functioning at the same time? Exactly how much data through put would you
consider to be usable in this scenario?
Again, my point is not that its impossible but that all these things are
impractical AND there are
I can't agree Jimmy, I don't see a few bps being anywhere close to being
useful in any of the scenarios your describe especially because there are
easier ways of doing those things. To do any of that the first thing you
have to do is establish the CC channel so now you have a very low bit rate
On 6/15/13, Scott Helms khe...@zcorum.com wrote:
They're terrible places for gathering non-targeted information because the
amount of data flowing through them means that that the likelihood of any
give packet having any value is very very low. If the goal includes
[snip]
The probability of
Jimmy,
This I agree with and in fact I said in earlier parts of this conversation
that the existence of a kill switch and/or backdoor in Huawei gear wouldn't
surprise me at all. Of course I'd say the same thing about pretty much all
the gear manufacturers and its really just a question of who
First: this is a fascinating discussion. Thank you.
Second:
On Sat, Jun 15, 2013 at 01:56:34AM -0500, Jimmy Hess wrote:
There will be indeed be _plenty_ of ways that a low bit rate channel
can do everything the right adversary needs.
A few bits for second is plenty of data rate for
On 06/15/2013 05:13 AM, Rich Kulawiec wrote:
First: this is a fascinating discussion. Thank you.
Second:
On Sat, Jun 15, 2013 at 01:56:34AM -0500, Jimmy Hess wrote:
There will be indeed be _plenty_ of ways that a low bit rate channel
can do everything the right adversary needs.
A few bits
i wonder if and how many governments are worried about when the nsa
tells cisco to send the kill switch signal to their routers.
randy
On 6/15/13 5:35 PM, Randy Bush wrote:
i wonder if and how many governments are worried about when the nsa
tells cisco to send the kill switch signal to their routers.
Having worked for an Israel-based security vendor I'd opine:
A. That many sovereign states are concerned about sourcing for
On Sat, Jun 15, 2013 at 8:35 AM, Randy Bush ra...@psg.com wrote:
i wonder if and how many governments are worried about when the nsa
tells cisco to send the kill switch signal to their routers.
randy
What kill switch ?
http://www.cisco.com/en/US/products/csa/cisco-sa-20090325-udp.html
- Original Message -
From: Scott Helms khe...@zcorum.com
Is it possible? Yes, but it's not feasible because the data rate would be
too low. That's what I'm trying to get across. There are lots things that
can be done but many of those are not useful.
I could encode communications
- Original Message -
From: Jazz Kenny trapperjohn...@gmail.com
What about through SDR? ie. http://nuand.com/
I mean, 'subscriber' seems to indicate a layman, but SDR isn't too complex
to get running for someone with a modicum of electronics experience -
especially in this day and
What about through SDR? ie. http://nuand.com/
I mean, 'subscriber' seems to indicate a layman, but SDR isn't too complex
to get
running for someone with a modicum of electronics experience - especially
in this
day and age, where oscilloscopes and frequency analysis is available to
anyone with
On Thu, Jun 13, 2013 at 10:34:28AM -0600, Phil Fagan wrote:
Yeah, I can't imagine there is any real magic there...mystical protocol not
seen over transport.
Compromised NICs can leak info through side channels (timing) but
it's too low bandwidth. For end user devices with backdoors
(remote
On Thu, Jun 13, 2013 at 03:55:24PM -0700, Adrian wrote:
Extraordinary claims require extra ordinary proof.
Thanks for the pointers; most enlightening. (And I say that even
before coffee has taken full effect. I'll re-read once it has.)
However, and perhaps I should have explained this in my
I am only a lurker in this list. I am curious why nobody has
mentioned open source. Theres no way all these router-thingies would
have all his source code visible? a house made of glass?
--
--
ℱin del ℳensaje.
On Thu, Jun 13, 2013 at 09:11:35PM -0400, Scott Helms wrote:
I challenge your imagination to come up with a
common scenario where a non targeted I'm/they're here that's useful to
either the company or the Chinese government keeping in mind that you have
no fore knowledge of where these devices
Disclosure: I've been consulting to a group in Huawei for six years,
ever since I retired from Nortel. I have seen no sign of anything except
competent gathering of competitive information at meetings, the same as
we did at Nortel. I would not have expected to see anything else, of course.
As
Last I heard NANOG stands for North American Network Operators Group.
Anti-American comments are not welcome here..
LOL
- Original Message -
From: Eugen Leitl eu...@leitl.org
On Thu, Jun 13, 2013 at 10:34:28AM -0600, Phil Fagan wrote:
Yeah, I can't imagine there is any real magic there...mystical
protocol not seen over transport.
Compromised NICs can leak info through side channels (timing) but
On Fri, 14 Jun 2013 10:21:25 -0400, Tom Taylor said:
It's fun to speculate on how one might insert back doors in products,
but I'm not sure there's reason to tie such speculation to particular
vendors.
It's so much fun we've been doing it *at least* since we all wondered
where IBM got the
On Fri, Jun 14, 2013 at 8:47 AM, Rich Kulawiec r...@gsp.org wrote:
On Thu, Jun 13, 2013 at 09:11:35PM -0400, Scott Helms wrote:
I challenge your imagination to come up with a
common scenario where a non targeted I'm/they're here that's useful to
either the company or the Chinese government
Mobile Device.
Original message
From: Scott Helms khe...@zcorum.com
Date: 06/14/2013 10:23 AM (GMT-08:00)
To: Rich Kulawiec r...@gsp.org
Cc: NANOG nanog@nanog.org
Subject: Re: huawei
On Fri, Jun 14, 2013 at 8:47 AM, Rich Kulawiec r...@gsp.org wrote:
On Thu, Jun 13, 2013 at 09:11
On Fri, 14 Jun 2013 13:21:09 -0400, Scott Helms said:
How? There is truly not that much room in the IP packet to play games and
if you're modifying all your traffic this would again be pretty easy to
spot. Again, the easiest/cheapest method is that there is a backdoor there
already.
Do you
Ps.. Has anyone seen evidence echelon is actually PRISM?
Sent from my Mobile Device.
Original message
From: Scott Helms khe...@zcorum.com
Date: 06/14/2013 10:23 AM (GMT-08:00)
To: Rich Kulawiec r...@gsp.org
Cc: NANOG nanog@nanog.org
Subject: Re: huawei
On Fri, Jun 14, 2013
On 06/14/2013 10:51 AM, valdis.kletni...@vt.edu wrote:
On Fri, 14 Jun 2013 13:21:09 -0400, Scott Helms said:
How? There is truly not that much room in the IP packet to play games and
if you're modifying all your traffic this would again be pretty easy to
spot. Again, the easiest/cheapest
On Fri, Jun 14, 2013 at 1:51 PM, valdis.kletni...@vt.edu wrote:
On Fri, 14 Jun 2013 13:21:09 -0400, Scott Helms said:
How? There is truly not that much room in the IP packet to play games
and
if you're modifying all your traffic this would again be pretty easy to
spot. Again, the
On 06/14/2013 11:35 AM, Scott Helms wrote:
In $random_deployment they have no idea what the topology is and odd behavior is *always *noticed over time. The amount of time it would take to transmit useful information would nearly guarantees someone noticing and the more successful the exploit was
On Fri, 14 Jun 2013 14:35:08 -0400, Scott Helms said:
In $random_deployment they have no idea what the topology is and odd
behavior is *always *noticed over time.
Severe selection bias in that statement. Odd *noticed* behavior is always
noticed. There's literally *no* way to know how many
On 6/14/13, Scott Helms khe...@zcorum.com wrote:
backdoors (intentional or not) are in most if not all gear. Having said
that, it would still be pretty obvious in mass and over time to have
packets going to a predesignated host. Its not really possible for a box
to know whether its in a
Really? In a completely controlled network then yes, but not in a
production system. There is far too much random noise and actual latency
for that to be feasible.
On Jun 14, 2013 7:35 PM, Jimmy Hess mysi...@gmail.com wrote:
On 6/14/13, Scott Helms khe...@zcorum.com wrote:
backdoors
On 6/14/13, Scott Helms khe...@zcorum.com wrote:
Really? In a completely controlled network then yes, but not in a
production system. There is far too much random noise and actual latency
for that to be feasible.
I think you might be applying an oversimplified assumption the
situation.
Is it possible? Yes, but it's not feasible because the data rate would be
too low. That's what I'm trying to get across. There are lots things that
can be done but many of those are not useful.
I could encode communications in fireworks displays, but that's not
effective for any sort of
It is if you're trying to figure out something far away, smoke signals
come to mind (seriously).
Any amount of noise seen (aside from AWGN, obviously) in the world is not
a big deal. We have pretty neat ways to clean up noise in bandwidth
channels. ;)
On 06/14/2013 05:34 PM, Scott Helms wrote:
Is it possible? Yes, but it's not feasible because the data rate would be
too low. That's what I'm trying to get across. There are lots things that
can be done but many of those are not useful.
I could encode communications in fireworks displays,
I was a military guyback in the day 31m and 31q to be precise.
On Jun 14, 2013 9:09 PM, Michael Thomas m...@mtcc.com wrote:
On 06/14/2013 05:34 PM, Scott Helms wrote:
Is it possible? Yes, but it's not feasible because the data rate would be
too low. That's what I'm trying to get across.
I've always wondered about thatwould you know that the Huawei is
leaking data?
On Thu, Jun 13, 2013 at 10:10 AM, Randy Bush ra...@psg.com wrote:
we really should not be putting huawei kit into the backbone, there
might be backdoors where they can spy on our traffic
oh
well, so much
A local clec here in Canada just teamed up with this company to
provide cell service to the north:
http://cwta.ca/blog/2012/09/24/ice-wireless-iristel-and-huawei-partner-for-3g-wireless-network-in-northern-canada/
Scary
N.
On Jun 13, 2013, at 12:18 , Nick Khamis sym...@gmail.com wrote:
A local clec here in Canada just teamed up with this company to
provide cell service to the north:
http://cwta.ca/blog/2012/09/24/ice-wireless-iristel-and-huawei-partner-for-3g-wireless-network-in-northern-canada/
Scary
I've always wondered about thatwould you know that the Huawei is
leaking data?
yes. they have a contract to leak it to the NSA
On Thu, 13 Jun 2013, Phil Fagan wrote:
I've always wondered about thatwould you know that the Huawei is
leaking data?
the puddle on the floor isn't a giveaway?
--
david raistrickhttp://www.netmeister.org/news/learn2quote.html
dr...@icantclick.org ascii ribbon campaign -
On (2013-06-13 12:22 -0400), Patrick W. Gilmore wrote:
Do you think Huawei has a magic ability to transmit data without you noticing?
I always found it dubious that public sector can drop them from tender
citing publicly about spying, when AFAIK Huawei hasn't never actually been
to court about
Le 13/06/2013 18:22, Randy Bush a écrit :
I've always wondered about thatwould you know that the Huawei is
leaking data?
yes. they have a contract to leak it to the NSA
:-)
mh
Yeah, I can't imagine there is any real magic there...mystical protocol not
seen over transport.
On Thu, Jun 13, 2013 at 10:26 AM, david raistrick dr...@icantclick.orgwrote:
On Thu, 13 Jun 2013, Phil Fagan wrote:
I've always wondered about thatwould you know that the Huawei is
leaking
or
something that is magically messaged from the mother ship, but I am dubious.
It should be trivial to prove to yourself the box is, or is not, doing
something evil if you actually try.
--
TTFN,
patrick
--Original Message--
From: Patrick W. Gilmore
To: NANOG list
Subject: Re: huawei
Sent
On 06/13/2013 09:31 AM, Saku Ytti wrote:
On (2013-06-13 12:22 -0400), Patrick W. Gilmore wrote:
Do you think Huawei has a magic ability to transmit data without you noticing?
I always found it dubious that public sector can drop them from tender
citing publicly about spying, when AFAIK Huawei
Subject: Re: huawei
Sent: Jun 13, 2013 12:22 PM
On Jun 13, 2013, at 12:18 , Nick Khamis sym...@gmail.com wrote:
A local clec here in Canada just teamed up with this company to
provide cell service to the north:
http://cwta.ca/blog/2012/09/24/ice-wireless-iristel-and-huawei-partner
On 06/13/2013 09:35 AM, Patrick W. Gilmore wrote:
I am assuming a not-Hauwei-only network.
The idea that a router could send things through other routers without someone
who is looking for it noticing is ludicrous.
::cough:: steganography ::cough::
Mike
. You don't need to relay
data out to cause harm or watch over something, you simply have to visit more.
;)
Sent from my Mobile Device.
Original message
From: Patrick W. Gilmore patr...@ianai.net
Date: 06/13/2013 9:24 AM (GMT-08:00)
To: NANOG list nanog@nanog.org
Subject: Re
On 6/13/13, Michael Thomas m...@mtcc.com wrote:
On 06/13/2013 09:35 AM, Patrick W. Gilmore wrote:
I am assuming a not-Hauwei-only network.
The idea that a router could send things through other routers without
someone who is looking for it noticing is ludicrous.
::cough:: steganography
Not really, no one has claimed it's impossible to hide traffic. What is
true is that it's not feasible to do so at scale without it becoming
obvious. Steganography is great for hiding traffic inside of legitimate
traffic between two hosts but if one of my routers starts sending cay
photos
On 06/13/2013 10:20 AM, Scott Helms wrote:
Not really, no one has claimed it's impossible to hide traffic. What is true
is that it's not feasible to do so at scale without it becoming obvious.
Steganography is great for hiding traffic inside of legitimate traffic between
two hosts but if
.
Original message
From: Scott Helms khe...@zcorum.com
Date: 06/13/2013 10:22 AM (GMT-08:00)
To: Nick Khamis sym...@gmail.com
Cc: NANOG nanog@nanog.org
Subject: Re: huawei
Not really, no one has claimed it's impossible to hide traffic. What is
true is that it's not feasible to do
On Jun 13, 2013, at 11:35 AM, Patrick W. Gilmore patr...@ianai.net wrote:
Also, I find it difficult to believe Hauwei has the ability to do DPI or
something inside their box and still route at reasonable speeds is a bit
silly. Perhaps they only duplicate packets based on source/dest IP
That is far more feasible than mass interception and forwarding of traffic,
though there is (AFAIK) no indication that such a kill switch exists. I
also think that if China wanted to do something nefarious a far better
target would be Lenovo, which still seems to be an accepted vendor in US
This is a good point; unless your taping your traffic and examining it for
anything outside of the norm then would you ever see it? However, we are
talking transport protocols, no? I would certainly hope the OOB network was
monitored and controlled.
Hmm.a network of clients/servers
On 13/06/2013 18:42, Leo Bicknell wrote:
A hard coded backdoor password and username.
e.g.: http://www.phenoelit.org/dpl/dpl.html
Or alternatively if you want access to any huawei device with software
older than about a year ago:
http://phenoelit.org/stuff/Huawei_DEFCON_XX.pdf
A sequence of
be trivial to prove to yourself the box is, or is not, doing
something evil if you actually try.
--
TTFN,
patrick
--Original Message--
From: Patrick W. Gilmore
To: NANOG list
Subject: Re: huawei
Sent: Jun 13, 2013 12:22 PM
On Jun 13, 2013, at 12:18 , Nick Khamis sym
On 6/13/13 1:35 PM, Warren Bailey wrote:
They are a state controlled company. You think the PRC's party members dont
call the shots? I've been to Beijing for work.. I can assure you the
government has a very known presence through the private community. Often
times, graduates of their state
On Thu, Jun 13, 2013 at 3:28 PM, Bryan Fields br...@bryanfields.net wrote:
They are playing our love of But Wait There's More!. Give us everything at
deep discounts or for free and receive direct access to the core of every
major telecom company on the planet. For a few hundred million dollars
If this hasn't been beaten to death, a longer discussion of the threat
of Huawei/ZTE is discussed in this article I wrote for Information
Security a few months back:
http://searchsecurity.techtarget.com/feature/The-Huawei-security-risk-Factors-to-consider-before-buying-Chinese-IT
jms
--
Joel
On Thu, 13 Jun 2013, Bryan Fields wrote:
My objection to ZTE/Hauwei when I was at a cellular telco was just this.
I said there was no way I can agree with Chinese nationals having
unfettered access to our network.
Why would anyone outside of the US agree to have US products in their
Is that also not possibly the case with Cisco, Juniper, XYZ network
equipment vendors? If the Chinese are doing it, I would imagine we (along
with our pals) are doing it as well. It'll be interesting to see what NSA
dox this guy drops in the coming days and weeks ahead. All of the TV
pundits were
On 6/13/13 3:41 PM, Mikael Abrahamsson wrote:
My objection to ZTE/Hauwei when I was at a cellular telco was just this.
I said there was no way I can agree with Chinese nationals having
unfettered access to our network.
Why would anyone outside of the US agree to have US products in their
Apologies for making what could be construed as an off topic, political
comment, but doesn't everyone in the USA know by now that the PRC
represents a dagger aimed at the economic and national security of America?
A military invasion in slow motion as it were?
David
On Thu, Jun 13, 2013 at
On 2013-06-13 13:01, david peahi wrote:
Apologies for making what could be construed as an off topic, political
comment, but doesn't everyone in the USA know by now that the PRC
represents a dagger aimed at the economic and national security of America?
A military invasion in slow motion as it
I think one of the possibilities suggested beyond call-home or backdoors
was that they might have installed a secret kill-switch to be activated
against 'enemy' nodes in time of war was an cyber shock and awe campaign.
mg
On Thu, Jun 13, 2013 at 8:24 PM, Michael Thomas m...@mtcc.com wrote:
They are a state controlled company. You think the PRC's party members
dont call the shots?
and you live in a police and surveillance state where the govt sniffs
evey packet you send, ever phone call you make, ... other than style,
what's the dfference?
oh, i guess the chinese are only
Last I heard NANOG stands for North American Network Operators Group.
Anti-American comments are not welcome here..
David
On Thu, Jun 13, 2013 at 1:36 PM, Jeroen Massar jer...@massar.ch wrote:
On 2013-06-13 13:01, david peahi wrote:
Apologies for making what could be construed as an off
On 2013-06-13 14:28, david peahi wrote:
Last I heard NANOG stands for North American Network Operators Group.
Anti-American comments are not welcome here..
(IMHO there was nothing 'anti-american' about my statement, though I
guess it completely depends on what the definition of that would be;
1 - 100 of 143 matches
Mail list logo