Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I remember reading about this.

You are right. But to our defense: at this point we are again beyond the passive eavesdropping scenario I think we discussed above.

When you own the networking gear it is more or less game over for the victim anyway, isn't it?



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: