21 Jun
2014
21 Jun
'14
7:18 a.m.
On Sat, Jun 21, 2014 at 1:30 AM, coderman <coderman@gmail.com> wrote:
On Fri, Jun 20, 2014 at 8:10 AM, Georgi Guninski <guninski@guninski.com> wrote:
http://www.theregister.co.uk/2014/06/19/hackers_reverseengineer_nsa_spying_d...
my biased thoughts:
1. attacking like NSA means being in the middle. you can do this over various types of networks and protocols with very modest hardware;. less than off-the-shelf. the key is position, not hardware brute strength. (i don't consider passive surveillance an attack - more like an operational reality ;)
http://yatebts.com/products.php http://home.ettus.com/ http://sdr.osmocom.org/trac/wiki/rtl-sdr