On Sun, Mar 8, 2020 at 2:18 PM <bzs@theworld.com> wrote:

It's really not analogous to most of the mass attacks on the net
because the entire telco system is built to know who is using it in
great detail.

You don't think transit providers bill their customers?

The analogy holds surprisingly well.  Any transit provider (or other ISP) could trivially identify their customers who are launching spoofed attacks, simply by looking for a high volume of SYN packets, or a high diversity of source ASNs, or several other signals.  But instead they pretend it's "hard", just as the telcos do.  In reality, the only thing that's hard about it is the policy decision of turning away money.

Damian

Have you ever made a billable call and *not* been billed for it?

If you're getting the same "Hi, this is <NAME> from card holder
services" calls like everyone else, or auto warranty etc etc etc, that
means they're making millions of calls per day, possibly hundreds of
millions...per day.

No one makes many millions of voice calls without paying the telcos.

If you don't believe me try it. You'll have a swat team at your home
or office (or possibly a telco sales person) probably after just
hundreds of calls and you'll be blocked, shut down.

The telcos are making a lot of money on these calls.

They know exactly who is making them because they know exactly who
they're sending that bill to and their payment history.

Which primarily leaves the question of why this Kabuki theater by the
FCC et al pretending as if it's some vast, uncontrollable evil like
the corona virus etc.?

--
        -Barry Shein

Software Tool & Die    | bzs@TheWorld.com             | http://www.TheWorld.com
Purveyors to the Trade | Voice: +1 617-STD-WRLD       | 800-THE-WRLD
The World: Since 1989  | A Public Information Utility | *oo*