On Sun, Mar 8, 2020 at 2:18 PM <bzs@theworld.com> wrote:
It's really not analogous to most of the mass attacks on the net because the entire telco system is built to know who is using it in great detail.
You don't think transit providers bill their customers? The analogy holds surprisingly well. Any transit provider (or other ISP) could trivially identify their customers who are launching spoofed attacks, simply by looking for a high volume of SYN packets, or a high diversity of source ASNs, or several other signals. But instead they pretend it's "hard", just as the telcos do. In reality, the only thing that's hard about it is the policy decision of turning away money. Damian Have you ever made a billable call and *not* been billed for it?
If you're getting the same "Hi, this is <NAME> from card holder services" calls like everyone else, or auto warranty etc etc etc, that means they're making millions of calls per day, possibly hundreds of millions...per day.
No one makes many millions of voice calls without paying the telcos.
If you don't believe me try it. You'll have a swat team at your home or office (or possibly a telco sales person) probably after just hundreds of calls and you'll be blocked, shut down.
The telcos are making a lot of money on these calls.
They know exactly who is making them because they know exactly who they're sending that bill to and their payment history.
Which primarily leaves the question of why this Kabuki theater by the FCC et al pretending as if it's some vast, uncontrollable evil like the corona virus etc.?
-- -Barry Shein
Software Tool & Die | bzs@TheWorld.com | http://www.TheWorld.com Purveyors to the Trade | Voice: +1 617-STD-WRLD | 800-THE-WRLD The World: Since 1989 | A Public Information Utility | *oo*