Hacker News new | past | comments | ask | show | jobs | submit login

I remember reading about this.

You are right. But to our defense: at this point we are again beyond the passive eavesdropping scenario I think we discussed above.

When you own the networking gear it is more or less game over for the victim anyway, isn't it?




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: