Boston Linux & Unix (BLU) Home | Calendar | Mail Lists | List Archives | Desktop SIG | Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings
Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU

BLU Discuss list archive


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: NSA Guide to Securing RHEL5



 On Dec 10, 2007 3:22 PM, Matt Shields <[hidden email]> wrote: 
> On Dec 10, 2007 2:23 PM, Kristian Erik Hermansen 
> <[hidden email]> wrote: 
> > On Dec 10, 2007 11:18 AM, Bob - BLU <[hidden email]> wrote: 
> > > The back door comment was as an oblique reference to this article: 
> > > 
> > >   Did NSA Put a Secret Backdoor in New Encryption Standard? 
> > >   http://www.wired.com/politics/security/commentary/securitymatters/2007/11/securitymatters_1115
> > 
> > Either way, the NSA doesn't need backdoors to track you down.  Did you 
> > know that they pay millions of dollars for information warfare tools 
> > from hackers (ie. 0day, protocol flaws, etc) every year... 
> > -- 
> > Kristian Erik Hermansen 
> > "I have no special talent. I am only passionately curious." 
> > 
> 
> They also have sniffers located at all Tier 1 (and I think even Tier 
> 2) ISPs.  I know, I installed one back when I worked for an unnamed 
> ISP.  We weren't told what it was, we were just told to rack it and 
> don't ask questions. 
> 
> -- 
> -matt 
> 


BLU is a member of BostonUserGroups
BLU is a member of BostonUserGroups
We also thank MIT for the use of their facilities.

Valid HTML 4.01! Valid CSS!



Boston Linux & Unix / webmaster@blu.org