Hacker News new | past | comments | ask | show | jobs | submit login

The researchers who analyzed this attack call it a "Man-In-the-Middle (MITM) hijack", which makes this whole subthread kind of pointless since the journalist is just using the terminology of the original research.

Check out the researchers' article for tracerout data and other interesting details: http://www.renesys.com/2013/11/mitm-internet-hijacking/

And if you're interested in how the internet works at this level (BGP, peering, ISPs), the book "Tubes: A Journey to the Center of the Internet" is interesting reading.




Thankyou, I was for someone who had actually bothered to read the original paper to make this point.


Tubes was available for free on Amazon a few weeks ago and I picked it up. I'm looking forward to reading it.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: