To report a botnet PRIVATELY please email: [EMAIL PROTECTED] ----------
On Sun, Jan 21, 2007 at 12:18:49AM +0100, Peter Dambier wrote: > At least one of our polititians gave us the clue > about the programme attacking the router.
That's intriguing, and if the routers did use Linux that would ease development significantly (or at least provide a big pool of people skilled in developing for it). > It is said (polititians) that every packet transmitted > is also send to another place, not by the DSLAM but > by the troyan because it has to work in foraign > countries too. So to be invisible it has to double > your DSL-bandwidth. People are looking for the api > to switch bandwidth, hacking the software of the > motorola and broadcom chips. That would be far from stealthy; typically exfiltrating data is the riskiest part of a program like this, because it's just a matter of following the bits to the destination, and thus potentially identifying the guilty parties. However, a government agency is more than capable of preventing most people from being able to identify who is behind it. Using organized crime as a cover (for example, by having the data sent to a computer in Eastern Europe) is actually fairly clever, and not entire fiction if the groups operating there to summarize and report on the intercepts don't have official cover :-) However, a typical home user wouldn't be able to monitor the data going upstream of a DSL modem, since that's the endpoint of their administrative control. Clever. -- ``Unthinking respect for authority is the greatest enemy of truth.'' -- Albert Einstein -><- <URL:http://www.subspacefield.org/~travis/>
pgp9D9Dpjnwbh.pgp
Description: PGP signature
_______________________________________________ To report a botnet PRIVATELY please email: [EMAIL PROTECTED] All list and server information are public and available to law enforcement upon request. http://www.whitestar.linuxbox.org/mailman/listinfo/botnets
