TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

A Little-Known Company That Enables Mass Surveillance

127 点作者 a-no-n超过 8 年前

8 条评论

jgrahamc超过 8 年前
These DPI companies always make me smile because 20 years ago I was the inventor on this patent: <a href="https:&#x2F;&#x2F;patents.google.com&#x2F;patent&#x2F;US6182146B1&#x2F;en" rel="nofollow">https:&#x2F;&#x2F;patents.google.com&#x2F;patent&#x2F;US6182146B1&#x2F;en</a> It describes a way of doing DPI to identify protocols that are not running on standard ports. We used this for a protocol analysis product [0] that did network monitoring (for accounting purposes inside companies and led to companies discovering what people were mis-using their network connections for---hello PointCast[1]) and for prediction of network scaling needs. And all that was based on stuff I&#x27;d been doing from about 1984 [2].<p>Bottom line: scooping up packets is easy; encrypt your shit.<p>[0] <a href="https:&#x2F;&#x2F;www.cnet.com&#x2F;au&#x2F;news&#x2F;tool-gauges-web-apps&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.cnet.com&#x2F;au&#x2F;news&#x2F;tool-gauges-web-apps&#x2F;</a><p>[1] <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;PointCast_(dotcom)" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;PointCast_(dotcom)</a><p>[2] <a href="http:&#x2F;&#x2F;blog.jgc.org&#x2F;2011&#x2F;01&#x2F;network-protocol-analysis-prior-art.html" rel="nofollow">http:&#x2F;&#x2F;blog.jgc.org&#x2F;2011&#x2F;01&#x2F;network-protocol-analysis-prior-...</a>
brador超过 8 年前
Ponder: Is your available ISP speed restricted, through backdoor channels and red letters, to not overcome the throughput bandwidth of these devices?<p>Or, another way, is the maximum throughput of these monitoring setups limiting ISP maximum offered speeds in the countries that use them?<p>US, UK, Aus, Canada, the eyes, all have unusually low maximum consumer speeds vs. non implicated countries such as Japan, korea, even China, given the technology available today.
评论 #12773534 未加载
tptacek超过 8 年前
This article perfectly illustrates a major flaw in surveillance journalism.<p>As luck would have it, I&#x27;m pretty familiar with Endace --- or was, back in 2003-2005. I was at Arbor Networks then. Arbor does large-scale network instrumentation for anti-DDoS and performance monitoring. By the time I left, every major ISP in the world had their network instrumented with Arbor gear.<p>We&#x27;d had lots of conversations with Endace. We were as a firm extremely interested in any technology we could buy off the rack to get performant access to raw packets and telemetry data --- Arbor had no hardware engineers, and everything they shipped at the time shipped on COTS X86 rackmounts running OpenBSD. My point here is not just that there are multiple uses for the kind of stuff Endace makes, but also that I vividly remember Endace because very few companies made products in this space at all.<p>Obviously, any company that can facilitate efficient access to, storage of, and analysis of raw traffic data is going to have multiple markets to sell to. And we should not make apologies for companies that take the extra money --- sell their souls, so to speak --- by offering their products to facilitate dragnet surveillance. We would all do well to keep in mind that the problem with selling to this market is far worse than NSA&#x27;s abuses, which are <i>trivial</i> compared to the abuses perpetrated by countries in the Middle East and Asia. Point being: packaging and selling for the global surveillance market is ethically hazardous in the extreme.<p>No, the problem here is that this kind of story is unintentionally deceptive about who the real enablers of large-scale surveillance are. They&#x27;re not the dinky little company in New Zealand selling packet capture technology. They&#x27;re the networking and database giants, the companies our parents automatically have their retirement accounts invested in because they&#x27;re huge components of the stock market, who have entire teams of people, euphemistically named (maybe something like &quot;public sector&quot; or &quot;APAC public sector&quot; or &quot;GSA&quot; or &quot;defense&quot;), packaging and selling 8-9 figure &quot;solutions&quot; to government around the world. Compared the giants, Endace is a gnat. They&#x27;re not the enablers. We know who the real enablers are.<p>You can tell, because of the article&#x27;s lurid descriptions of Endace&#x27;s major transactions with GCHQ --- the focus of the article. They&#x27;ve got smoking gun proof: invoices for $300,000 and $160,000. Or: less than SourceFire would have charged Chick-Fil-A† to install commercial Snort boxes.<p>† <i>I have no idea if Chick-Fil-A was a SourceFire customer.</i>
评论 #12774524 未加载
评论 #12774231 未加载
reirob超过 8 年前
&quot;[..]Alongside its government clients, Endace has many major corporate customers.<p>Endace’s sales lists include finance industry giants such as Morgan Stanley, Reuters, and Bank of America. [..]&quot;<p>What for do finance companies need systems that intercept data?
评论 #12773742 未加载
评论 #12773014 未加载
评论 #12773008 未加载
Ganoes47超过 8 年前
Can someone ELI5 how they actually capture all these data ?<p>Are they basically cracking encryption ? I thought the kind of encryption provided by VPN services (256-bit AES&#x2F;CBC) was strong enough? If that&#x27;s what they do, aren&#x27;t they violating privacy laws ? Aren&#x27;t they breaching companies such as Google, Facebook etc... T&amp;C ? Are they installing some kinds of trojans, keyloggers and stuff on 3rd parties computers ? Isn&#x27;t what they are selling black hat hacking solutions ? Or are they only capturing clear traffic ? which is not necessarily very meaningful.<p>It says : &quot;extract information about people’s usage of services such as Gmail, Hotmail, WhatsApp, and Facebook&quot;<p>The latest terms and conditions you had to acknowledge recently to continue using watsapp (yes, I read them!) mentionned that they don&#x27;t keep a record of the content being exchanged via watsapp. So, is watsapp lying ? Or what does this Endace system records ? Watsapp T&amp;C also say that they use a strong encryption. so, FTW?
评论 #12773746 未加载
评论 #12773392 未加载
jlgaddis超过 8 年前
Gigamon, who has both an office in Milpitas and a government sales division (including for overseas governments), makes photonic tapping systems that are also pretty useful for this mass surveillance kind of stuff.<p>Five years ago, they had a box capable of handling 1 Tbps and assured us that bigger, beefier ones were coming. US DoD was a customer then and, I&#x27;m sure, still is.
b0ner_t0ner超过 8 年前
Are we still safe using Tor?
评论 #12773491 未加载
omgtehlion超过 8 年前
[slightly offtopic] Does anyone have a driver for Endace DAG 9.2X and is willing to share? )