My understanding is that whereas Huawei have indeed shared source code with various governments and customers, they've been having trouble with the reproduceability of their builds, such that it was difficult for the reviewers of the provided source code to determine whether the binaries had indeed been built from that source code (and from nothing else besides).
I've always wondered why ethics classes are mandatory for engineers in many schools now.
It's usually the business people that have the ethics issues.
People who train as engineers are well placed to become managers. For example: when I trained as an engineer I decided early on that I did not want to remain in a purely technical role beyond 10 years after I graduated. So I took an MBA class and left R&D, which enabled me to work in sales, finance, project management, and most recently quality management. My engineering background was useful in all of these roles.
Indeed. And we have to have the courage to admit that $1.6bn over 10 years is a vanishingly small number in comparison with Huawei's revenue over that same period of time.
Most of the components still come from China though. Assembly is not where most of the value sits. So GoPro will have long supply lines for the components.
These attacks cause service outages because legitimate DNS lookups can't be handled by the servers that are under attack (which I'm assuming here to be the authoritative name servers for the domains that are experiencing service outages). Most users don't ever query the authoritative servers directly; the legitimate queries come from their ISPs' resolvers, and those resolvers only query the authoritative servers if they don't already have the answer in their local cache. And that only happens (in respect of popular sites) when the cache entry's time-to-live has come and gone.
So perhaps one way of at least partially mitigating these attacks is for resolvers to hang onto cached records past their TTL and to continue serving them when the authoritative name servers are unavailable. Those resolvers will then of course need a robust alternative cache ejection policy (e.g. based on the frequency with which an expired record continues to be used, how overdue it is, and overall resource usage).
I do realise that Dyn is also known for their dynamic DNS service, and that the above mitigation isn't effective for ephemeral records which intentionally have a short TTL. That can't be helped.
"I think Michael is like litmus paper - he's always trying to learn." -- Elizabeth Taylor, absurd non-sequitir about Michael Jackson