1995-11-07 - Re: toolkits?

Header Data

From: shields@tembel.org (Michael Shields)
To: cypherpunks@toad.com
Message Hash: 7b6884fe597052ef87bb13f64f50b57d023b377858087a4f4850e438af3ba1f4
Message ID: <47moi5$ahc@yage.tembel.org>
Reply To: <199511070141.UAA15583@maple.sover.net>
UTC Datetime: 1995-11-07 06:56:19 UTC
Raw Date: Tue, 7 Nov 1995 14:56:19 +0800

Raw message

From: shields@tembel.org (Michael Shields)
Date: Tue, 7 Nov 1995 14:56:19 +0800
To: cypherpunks@toad.com
Subject: Re: toolkits?
In-Reply-To: <199511070141.UAA15583@maple.sover.net>
Message-ID: <47moi5$ahc@yage.tembel.org>
MIME-Version: 1.0
Content-Type: text/plain


In article <199511070141.UAA15583@maple.sover.net>,
Stephen Whitaker <whitaker@sover.net> wrote:
> What constitutes a basic toolkit for trace route, sniff for promiscuous
> mode, all the other tools to map whats happening to net traffic in a little
> state of 1/2 million people? What are the sources of traffic information?

It won't help, because tapping wouldn't be done at the BGP4 level,
but at the switch (if with telco cooperation) or directly on the lines.
*You need end-to-end encryption*.  You need Kerberos or IPSEC.
-- 
Shields.





Thread