...or use SSH tunneling and generate new keys frequently
if they are really paranoid. I think with fiber and some
sort of encryption scheme a person intent on sniffing traffic
has there work cut out.

At this point however it would probably be easier to bypass
the fiber altogether and exploit a workstation/server connected
to the internal LAN.

-Jimmy

-----Original Message-----
From: Chris Berry [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, December 24, 2002 12:18 PM
To: [EMAIL PROTECTED]
Subject: RE: Fiber optic vampire taps


>From: "Hornat, Charles" <[EMAIL PROTECTED]>
>This is not true.  The US Navy did this to the Russians a few years
>back.
>http://www.bizjournals.com/philadelphia/stories/2002/07/29/newscolumn2
>.html
>I don't recall what this method was called back then though, it wasn't
>"clips".

You know, now that I think about it, if they are so worried, why not just
set up a VPN?

Chris Berry
[EMAIL PROTECTED]
Systems Administrator
JM Associates

"I can sleep at night because my servers are secure.  What's the secret you
ask?  I filled them with concrete."

_________________________________________________________________
MSN 8: advanced junk mail protection and 3 months FREE*.
http://join.msn.com/?page=features/junkmail&xAPID=42&PS=47575&PI=7324&DI=747
4&SU=
http://www.hotmail.msn.com/cgi-bin/getmsg&HL=1216hotmailtaglines_advancedjmf
_3mf


Reply via email to