On 23/06/2013, at 1:21 PM, William Allen Simpson wrote: > What security protocols are folks using to protect SONET/SDH? > At what speeds?
"Excuse me NSA, can I have export approval for one KG-530 SDH encryptor?" What are the odds :-) And how would we know that the "export model" isn't simply providing a more convenient backdoor for the NSA? -glen