Cloak-And-Dagger Router Routing

The latest development in the cold war between the tech industry and the US government – Cisco will now ship routers to fake drop addresses to prevent the government from intercepting and bugging them:

Sometimes I suspect that Poe’s Law is the real reason Jon Stewart decided to call it quits.

Who is Daren Pauli and if attributed to him, his editors are even bigger idiots than he is.
Since this is MPSIMS … Cisco, et al, have been co-hooting with “back doors” for some time now.

Nothing new here, carry on.

LOL.

I like the Spy/Action Hero newsletter you subscribe to. May I join?

“If a truly dedicated team is coming after you for a very long period of time, then the probability of them succeeding goes up,”

Yeppers.
But can you tell me what I had for lunch today and where?
And which Visa card I expensed?

Bring it on.
Routers? BTDT.

You can tell an article was written by a tech nerd when the plural of “box” is “boxen”.

LOL But you know, I truly have to apologize to **Steve MB **and the rest of you here for the snark.
I want to fight ignorance, be a mentor if possible, and learn as much as I can from my silly questions and life observations.

But yeppers…boxen…:smack:

So why isn’t “the government” simply intercepting the shipments once they leave Cisco’s dock? That way, the address on the shipping label is meaningless.

What intercept? I would imagine that the government has people working on the assembly line installing the backdoors when they build the routers [or it is on the chip, or however they are claiming it is done…] well before they go out the damned door.

The Feds aren’t tampering with all boxen, only those going to certain targets. If the target is using a fake name/address, then the Feds don’t know which one is the target’s box.

There is a related problem with NSA malware embedding itself in the firmware of HDs. Format and reinstall doesn’t make it go away.

In both cases, the vendors need to make available open source firmware verification tools with MD5 hashes. (Assuming the Feds don’t force them to post hashes of the Feds malware code, too. In which case more openness is required.)