Oh yeah, that's both more plausible and more alarming. I'm now imagining scandalous telephone recordings popping up on Wikileaks. They could have a pair of Boeing engineers casually discussing top secret skunkworks stuff. People say all kinds of crap on the phone that they won't put into an email.
On Tue, Oct 8, 2024 at 10:42 PM Ken Hohhof <khoh...@kwom.com> wrote: > Maybe they were after voice not data? > > ---- Original Message ---- > From: dmmoff...@gmail.com > Sent: 10/8/2024 9:32:02 PM > To: "'AnimalFarm Microwave Users Group'" <af@af.afmug.com> > Subject: Re: [AFMUG] CALEA > > Interesting. In a nutshell: Lumen, AT&T, and Verizon have some internal > mechanisms to capture customer traffic for CALEA compliance, and someone > got > access to all three. > > I wonder for how long the attackers had that access. > I wonder which customers the attackers spied on. > > And since people are using TLS for almost everything these days, how much > useful information can the attackers really get from the ISP side? It's > kind of novel to see something unencrypted in a packet capture these days. > > > > -----Original Message----- > From: AF <af-boun...@af.afmug.com> On Behalf Of Ken Hohhof > Sent: Tuesday, October 08, 2024 9:27 PM > To: af@af.afmug.com > Subject: [AFMUG] CALEA > > > https://techcrunch.com/2024/10/07/the-30-year-old-internet-backdoor-law-that > -came-back-to-bite/ > <https://techcrunch.com/2024/10/07/the-30-year-old-internet-backdoor-law-that-came-back-to-bite/> > > > > -- > AF mailing list > AF@af.afmug.com > http://af.afmug.com/mailman/listinfo/af_af.afmug.com > > > -- > AF mailing list > AF@af.afmug.com > http://af.afmug.com/mailman/listinfo/af_af.afmug.com > > > > -- > AF mailing list > AF@af.afmug.com > http://af.afmug.com/mailman/listinfo/af_af.afmug.com >
-- AF mailing list AF@af.afmug.com http://af.afmug.com/mailman/listinfo/af_af.afmug.com