Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror

Comment Re:Secure deep packet inspection? (Score 1) 52

You still see the packets on the wire. Every flow has a 5-tuple associated with it that uniquely identifies the flow. Sandvine also can correlate other orthogonal pieces of information such as subscriber, location, time-of-day, destination, etc.

So by itself, an SSL-encrypted packet means the device cannot decrypt the payload. That's not the point. I know already from the network that the packet came from some IMSI, which was connected to some eNB at a specific location, during some time of day where there was a demonstration, and it the destination was a specific AS community that hosts something I want to prevent.

Those metadata are enough to make me suspicious, or fit a criteria such that I can block that traffic based on the above conditions.

Source: Me: Ex-Sandviner worked in Tunisia and Egypt during the arab spring in 2012 to overcome government regulations.

Comment Re:MacOS X (Score 1) 36

Darwin *IS* a full-blown OS in its own right. It's even been built over to x86 machines.

It's no slouch. I managed to actually have a functional Darwin System on my Lombard G3. I built emacs and lynx under it fine...

Slashdot Top Deals

"Flattery is all right -- if you don't inhale." -- Adlai Stevenson

Working...