The $Customer will have his Pizza and Entertainment well served,
functioning and NOW for $0 costs.
So how will you provide security under this circumstances?

Impossible. Beside the fact, that this entire NSA-Story is funny as hell.
Why?
Deal with it, deal with the world you (the crowd) would like to have. You
got already warned. More than once.

do you really care about security? yes? thats funny in times were big
Companies like the T-Com are shipping their
OEM-Ed Netgear hardware with all credentials printed on the back side.
there are:
SSID, WLAN-WPA2-KEY, MAC. What do you need more?
So the customer isn't interested in security. the Workers at the backbones
are customers too
that also use this shit and they didn't care about is. only few ppl. like
us care about it.
otherwise it wouldn't possible that the NSA could spread their tentacles so
far.
So forget about it. do not worry be happy.

Netgear, for the fun called their App for mobiles "Genie". lol

The Customers (the crowd) called out ppl. that warned them as "paranoid
idiots".
OTOH they dictate you to invent and make bullshit, even if you pointed the
bullshit and the consequences out.
they like to get bullshit. so they should get it. Without my help please. i
stopped to work at those areas after
i got pressed to make to much bullshit. This is not only spreaded in the
B2C market, its spreaded all around.
even if there are planned out times for exactly this. Upgrade the backbone
Switches. the planned times get not used for it. huhhhhh its too
dangerous....
huuuhh....it will not go afterwards....
i anwered all the times such sayings with: fine, silence. we need more of
it.

So do not care to much about it. Make a business out of if and specialize
at a certain point on
closing security holes the easy way, just by upgrading. Tell them about
some black magic and
things they would never understand and that those things are so crazy that
they are close to god.
may be they believe you than and may be they honor your work not just for
the fact that everything runs.

=========

also interesting: ACPI-Hypervisor Trojans.
I watched 2004-2007 goings on Black Hat around
http://en.wikipedia.org/wiki/Blue_Pill_(software)
and afterwards the Proof-Of-Concept ACPI-VM-Trojan got taken off from the
net.
everything seemed cleaned up. Though i am not sure if i have a back up. lol

what about ACPI and Switches/Routers an VMM capabilities of their CPU's?
if that ACPI-VMM-Thingy is in the hands of Intelligence Agencies, we must
not longer care only about
Operating Systems and Customer Software.

Any Ideas to this?


= = =  http://michael-schuh.net/  = = =
Projektmanagement - IT-Consulting - Professional Services IT
Rev. Michael 
Schuh<http://dudeism.com/ordcertificate?ordname=Michael+Schuh&orddate=05/20/2012>
*Ordained Dudeist Priest <http://dudeism.com/>*
Postfach 10 21 52
66021 Saarbrücken
phone: 0681/8319664
@: m i c h a e l . s c h u h @ g m a i l . c o m

= = =  Ust-ID:  DE251072318  = = =


2013/9/5 Jim Pingle <li...@pingle.org>

> On 9/4/2013 8:33 PM, Robert Guerra wrote:
> > Curious on people's comments on  types of routers, firewalls and other
> appliances that might be affected as well as mitigation strategies. Would
> installing a pfsense and/or other open source firewall be helpful in anyway
> at a home net location?
>
> The text you sent seems to primarily focus on infrastructure routers --
> those used at ISPs, peering points, etc. Home routers are a different
> breed, but suffer the same or more problems.
>
> Aside from the example Chris gave, here's another good one from earlier
> this year:
>
> http://securityevaluators.com/content/case-studies/routers/soho_service_hacks.jsp
>
> But it doesn't matter if the vendors issue a patch, people actually have
> to install the update to fix it, and odds are high that typical end
> users have no idea that is even possible or something they have to do.
>
> Jim
>
> _______________________________________________
> List mailing list
> List@lists.pfsense.org
> http://lists.pfsense.org/mailman/listinfo/list
>
_______________________________________________
List mailing list
List@lists.pfsense.org
http://lists.pfsense.org/mailman/listinfo/list

Reply via email to