On Wed, Sep 16, 2009 at 5:01 PM, Rich Jones r...@anomos.info wrote:
http://www.reddit.com/r/IAmA/comments/9kwph/i_am_a_guy_who_writes_covert_software_that_runs/
Thoughts?
also, I realized that two of the posts I've made this this list have now
been reddit-related. Sorry about that. But I'd
auth 809bb944ff73e094 subscribe or-talk hrg...@gmail.com
http://www.reddit.com/r/IAmA/comments/9kwph/i_am_a_guy_who_writes_covert_software_that_runs/
Thoughts?
The mention of C like code and the DPI makes me think the hardware
uses Intel's IPX series network processors. For those, the ruleset is
basically written in C and uploaded to the device.
- Forwarded message from Ted Smith te...@cs.umd.edu -
From: Ted Smith te...@cs.umd.edu
Date: Thu, 17 Sep 2009 12:11:12 -0400
To: Eugen Leitl eu...@leitl.org
Cc: cypherpu...@al-qaeda.net
Subject: Re: good troll, intelligence psyops, or the genuine article? you
decide
X-Mailer:
The IXP2800 can do line-rate 10gbps
http://download.intel.com/design/network/ProdBrf/27905403.pdf
Here's one more link that explains the IXP series architecture
http://www.cs.uiuc.edu/homes/luddy/PROCESSORS/IXP2850.pdf
(basically, all the OP on Rededit was saying, was he's the guy that
On Thu, Sep 17, 2009 at 3:49 PM, Eugen Leitl eu...@leitl.org wrote:
- Forwarded message from Ted Smith te...@cs.umd.edu -
From: Ted Smith te...@cs.umd.edu
Date: Thu, 17 Sep 2009 12:11:12 -0400
To: Eugen Leitl eu...@leitl.org
Cc: cypherpu...@al-qaeda.net
Subject: Re: good troll,
On Thu, 2009-09-17 at 15:59 -0400, Brian Mearns wrote:
Could you explain what psyops refers to? Psychological operations? If
I understand correctly, you're suggesting that perhaps he/his
organization doesn't really have all the capabilities he implies, but
that they're trying to scare people
On Thu, Sep 17, 2009 at 03:59:17PM -0400, Brian Mearns wrote:
Could you explain what psyops refers to? Psychological operations? If
I understand correctly, you're suggesting that perhaps he/his
organization doesn't really have all the capabilities he implies, but
that they're trying to scare
On Thu, Sep 17, 2009 at 10:24:35PM +0200, Eugen Leitl wrote:
It's better to think that your adversary is more capable than assuming
the opposite. This isn't necessarily about Tor, since Tor explicitly
wasn't designed to deal with that kind of threat model. However, it's
a good idea to think
On Thu, Sep 17, 2009 at 03:58:50PM -0400, Michael Holstein wrote:
(basically, all the OP on Rededit was saying, was he's the guy that
writes the microengine code) .. the processors themselves aren't
Not quite -- he explicitly claimed they used custom hardware. Perhaps
using network
10 matches
Mail list logo