
----- Original Message -----
From: "Eugen Leitl" <eugen@leitl.org>
On Thu, Jun 13, 2013 at 10:34:28AM -0600, Phil Fagan wrote:
Yeah, I can't imagine there is any real magic there...mystical protocol not seen over transport.
Compromised NICs can leak info through side channels (timing) but it's too low bandwidth. For end user devices with backdoors (remote vulnerabilities are like sloppy backdoors) you could get away with 'it's just part of a botnet', perhaps.
And the scope can be pretty big... Oh, look! This VZW 4G hockey puck was made by... ZTE. And it has a GPS receiver in it. Cheers, -- jra -- Jay R. Ashworth Baylink jra@baylink.com Designer The Things I Think RFC 2100 Ashworth & Associates http://baylink.pitas.com 2000 Land Rover DII St Petersburg FL USA #natog +1 727 647 1274