Last edited by beniwtv; June 27th, 2011 at 11:49 AM. Reason: typo
Benedikt Bär - www.relamp.tk
WARNING: Some commands can be harmful when executed, especially the ones starting with "rm". If you are in doubt what a certain command will do, please ask other members first before executing!
Of course the professional spooks can tap into just about anything, but both fax and phone are essentially direct connections between point A and point B rather than routing, in the clear, between any number of servers along the way. As such, they offer much less opportunity for interception by the average script kiddie. Anything that uses the Internet is vulnerable to a man-in-the-middle attack; direct point-to-point contacts are not so much so.
--
Jim Kyle in Oklahoma, USA
Linux Counter #259718
Howto mark thread: https://wiki.ubuntu.com/UnansweredPo.../SolvedThreads
Nope, phone lines are routed through various centrals, analog switches, cabling, etc... along the way, sometimes even over the Internet depending on your destination. It's not really point A to point B.
Man-in-the-middle attacks can only be prevented by using encryption. Relying on clear protocols _never_ is secure.
That being said, your communications being intercepted amongst the millions is slim at best, and this is only an advise, never trust any type of open connections.
Benedikt Bär - www.relamp.tk
WARNING: Some commands can be harmful when executed, especially the ones starting with "rm". If you are in doubt what a certain command will do, please ask other members first before executing!
Man in the middle attacks are only reliable if you're on a guaranteed route between the points. There are relatively few choke points on the Internet. It's not a cloud exactly, but there are diverse routes in case one goes down.
As well, if you suspect your "man in the middle" is the government of whatever country you're in, then chances are you don't have much chance to protect yourself even if you do have encryption.
Ah, the "zip zap" machine. I nearly scored a free lunch once after turning up at a cafe during a break in the filming of a commercial.
(This isn't the actual commercial, but is part of the same campaign.)
Forum DOs and DON'Ts
Please use CODE tags
Including your email address in a post is not recommended
My Blog
I remember when ATM first started getting popular they were all modem based. Some time during the night the ATM would dial up the central office and exchange data. The branch ATM had no idea if you already withdrew your daily limit at another location. People would go from branch to branch withdrawing the maximum amount from each ATM branch. The problem wasn't discovered until the machines synced that night.
You worked in the ATM industry for 20 years and wrote "ATM MACHINE?"
am i wrong or did the old ones, 1980's and before, not have mag strips at all? imprint was proof of actual card purchase rather than invention/fraud on seller's part, and the physical receipts were daily stuff of business, in the zipup envelope of a register at the end of the day w/ the paper checks and all. atm cards only worked at the bank and credit cards, no debit, at the store...
Bookmarks