mailing list archives
From: Eugen Leitl <eugen () leitl org>
Date: Fri, 14 Jun 2013 08:47:46 +0200
On Thu, Jun 13, 2013 at 10:34:28AM -0600, Phil Fagan wrote:
Yeah, I can't imagine there is any real magic there...mystical protocol not
seen over transport.
Compromised NICs can leak info through side channels (timing) but
it's too low bandwidth. For end user devices with backdoors
(remote vulnerabilities are like sloppy backdoors) you could
get away with 'it's just part of a botnet', perhaps.
Re: huawei Rich Kulawiec (Jun 13)
Re: huawei Patrick W. Gilmore (Jun 13)