On 6/23/2013 9:18 PM, Glen Turner wrote:
On 23/06/2013, at 1:21 PM, William Allen Simpson wrote:
What security protocols are folks using to protect SONET/SDH? At
what speeds?
"Excuse me NSA, can I have export approval for one KG-530 SDH
encryptor?" What are the odds :-)
And how would we know that the "export model" isn't simply providing
a more convenient backdoor for the NSA?
I assumed that the latter is what "NSA Approved" means.
--
Requiescas in pace o email Two identifying characteristics
of System Administrators:
Ex turpi causa non oritur actio Infallibility, and the ability to
learn from their mistakes.
(Adapted from Stephen Pinker)