[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
huawei
On 06/14/2013 11:35 AM, Scott Helms wrote:
> In $random_deployment they have no idea what the topology is and odd behavior is *always *noticed over time. The amount of time it would take to transmit useful information would nearly guarantees someone noticing and the more successful the exploit was the more chance for discovery there would be.
As a software developer for many, many years, I can guarantee you
that is categorically wrong. I'd venture to say you probably don't even
notice half. And that's for things that are just bugs or misfeatures.
Something that was purposeful and done by people who know what
they're doing... your odds in Vegas are better IMO.
Mike, who's seen way too many "how in the hell did that ever work?"
- References:
- huawei
- From: patrick at ianai.net (Patrick W. Gilmore)
- huawei
- From: mike at mtcc.com (Michael Thomas)
- huawei
- From: symack at gmail.com (Nick Khamis)
- huawei
- From: khelms at zcorum.com (Scott Helms)
- huawei
- From: bill at herrin.us (William Herrin)
- huawei
- From: khelms at zcorum.com (Scott Helms)
- huawei
- From: mike at mtcc.com (Michael Thomas)
- huawei
- From: khelms at zcorum.com (Scott Helms)
- huawei
- From: rsk at gsp.org (Rich Kulawiec)
- huawei
- From: khelms at zcorum.com (Scott Helms)
- huawei
- From: Valdis.Kletnieks at vt.edu (Valdis.Kletnieks at vt.edu)
- huawei
- From: khelms at zcorum.com (Scott Helms)