...or use SSH tunneling and generate new keys frequently if they are really paranoid. I think with fiber and some sort of encryption scheme a person intent on sniffing traffic has there work cut out.
At this point however it would probably be easier to bypass the fiber altogether and exploit a workstation/server connected to the internal LAN. -Jimmy -----Original Message----- From: Chris Berry [mailto:[EMAIL PROTECTED]] Sent: Tuesday, December 24, 2002 12:18 PM To: [EMAIL PROTECTED] Subject: RE: Fiber optic vampire taps >From: "Hornat, Charles" <[EMAIL PROTECTED]> >This is not true. The US Navy did this to the Russians a few years >back. >http://www.bizjournals.com/philadelphia/stories/2002/07/29/newscolumn2 >.html >I don't recall what this method was called back then though, it wasn't >"clips". You know, now that I think about it, if they are so worried, why not just set up a VPN? Chris Berry [EMAIL PROTECTED] Systems Administrator JM Associates "I can sleep at night because my servers are secure. What's the secret you ask? I filled them with concrete." _________________________________________________________________ MSN 8: advanced junk mail protection and 3 months FREE*. http://join.msn.com/?page=features/junkmail&xAPID=42&PS=47575&PI=7324&DI=747 4&SU= http://www.hotmail.msn.com/cgi-bin/getmsg&HL=1216hotmailtaglines_advancedjmf _3mf
