Paul Hughes said:
> Transhuman Mailing List
> I just read this article by Robert X. Cringley:
What an appropriate name.
> Original Article: http://www.pbs.org/cringely/pulpit/pulpit20000713.html
> But I have my own theory about Carnivore. From a network
> architecture standpoint, the best location for Carnivore is right after
> the ISP's router. This puts Carnivore in the path of every packet
> entering or leaving the ISP. It's also a major reason why ISPs might
> not want to install Carnivore boxes -- it's the network's point of
> greatest vulnerability. In this position, Carnivore can act as a
> listening and recording device, OR IT CAN ACT AS A SWITCH. If
> we ever hear a proposal from the FBI in which it plans to install
> Carnivores at all 6000 ISPs in the U.S., we'll be giving the
> government the power to do something it can't do right now.
> Shut the Internet down.
For the approximately ten minutes it will take ISP owners to figure
out what happened, and disconnect the box.
Sheesh.
-- John S. Novak, III jsn@concentric.net The Humblest Man on the Net
This archive was generated by hypermail 2b29 : Mon Oct 02 2000 - 17:34:45 MDT