On 6/23/2013 9:18 PM, Glen Turner wrote:
On 23/06/2013, at 1:21 PM, William Allen Simpson wrote:
What security protocols are folks using to protect SONET/SDH? At what speeds?
"Excuse me NSA, can I have export approval for one KG-530 SDH encryptor?" What are the odds :-)
And how would we know that the "export model" isn't simply providing a more convenient backdoor for the NSA?
I assumed that the latter is what "NSA Approved" means. -- Requiescas in pace o email Two identifying characteristics of System Administrators: Ex turpi causa non oritur actio Infallibility, and the ability to learn from their mistakes. (Adapted from Stephen Pinker)
participants (1)
-
Larry Sheldon