Really, how much trouble could we get in if we posted up a list of
street addresses, each address being a building that contained
significant telco and/or routing infrastructure?
try it, it's amusing. remember the all the photogs getting hassled by the
man for merely taking pictures of
On Sun, 2007-12-02 at 06:24 +0100, [EMAIL PROTECTED] wrote:
On Sat, 01 Dec 2007 23:13:31 EST, gmaggro said:
Ah yes, I remember an old story not too dissimilar... multiple redundant
lines, all severed at the same time with the same backhoe. Idiots.
To be fair, it's often not idiots.
you should destroy myspace.com
after the downfall of and removal of myspace, many emo kids and future
teenage moms will commit sucide saving the world from future jerry springer
episodes and adding to the list of an heroes
On 11/30/07, gmaggro [EMAIL PROTECTED] wrote:
I think it'd be
translation: let's discuss how to discern high degree and/or vulnerable
nodes in critical infrastructure networks.
Correct.
1. To bring like minded people together while operating under the
strategy of 'leaderless resistance'
(http://en.wikipedia.org/wiki/Leaderless_resistance)
*yawn*
Forgot to tack these onto the last post. The wikipedia entry
http://en.wikipedia.org/wiki/Submarine_communications_cable has some
amusing links in it's reference section:
http://www.telegeography.com/products/map_cable/images/sub_cable_2007_large.jpg
On Dec 1, 2007 8:09 AM, gmaggro [EMAIL PROTECTED] wrote:
...
Why not advocate? If you did get in trouble for this post, I don't think
adding a caveat like of course not advocation would help you much, if
at all. Like those quips in Phrack or Paladin Press books For
educational purposes only.
(in telco land, one SONET span over aerial transport and the other buried
plant is considered sufficient path diversity/redundancy. never mind that
the same right of way is used...)
Ah yes, I remember an old story not too dissimilar... multiple redundant
lines, all severed at the same time
On Sat, 01 Dec 2007 23:13:31 EST, gmaggro said:
Ah yes, I remember an old story not too dissimilar... multiple redundant
lines, all severed at the same time with the same backhoe. Idiots.
To be fair, it's often not idiots. First, you have to find 2 providers
that can get fiber from point A to
On Friday 30 November 2007 09:02:26 gmaggro wrote:
I think it'd be interesting if we started a discussion on the selection
of high value targets to be used in the staging of attacks that damage
significant infrastructure. The end goals, ranked equal in importance,
would be as follows:
[big
I think it'd be interesting if we started a discussion on the selection
of high value targets to be used in the staging of attacks that damage
significant infrastructure. The end goals, ranked equal in importance,
would be as follows:
1. To bring like minded people together while operating under
On Nov 30, 2007 11:02 AM, gmaggro [EMAIL PROTECTED] wrote:
I think it'd be interesting if we started a discussion on the selection
of high value targets
translation: let's discuss how to discern high degree and/or vulnerable
nodes in critical infrastructure networks.
1. To bring like minded
11 matches
Mail list logo