Ramblings of an old Doc
Published on March 27, 2011 By DrJBHL In Personal Computing

 

Well, a weird thing happened the other day (and not for the first time).

Turns out if you visited/commented on Facebook, you (and 10% of web traffic) took a trip to China, South Korea and back. Yep: Route-Jacking.

Facebook traffic for AT&T customers was routed through Chinese and Korean servers for some unspecified amount of time, raising privacy concerns.

Some of the network traffic heading to Facebook’s servers in Palo Alto, Calif., was re-routed to first pass through Chinese and Korean servers, on March 22. and was thought probably an accident.

“A similar incident surfaced almost exactly a year ago on April 8, 2010, when a Chinese ISP incorrectly published a set of BGP (Border Gateway Protocol) instructions that could have potentially affected 37,000 networks. The incident lasted only 18 minutes, and China Telecom, the country’s largest ISP, denied trying to hijack Internet traffic. Experts speculated it was an accident because of how quickly it was fixed.”

If you’ll remember, I discussed BGP’s and how the net could be brought down by simply increasing the length of time in reporting ‘backups’ or ‘busy’ signals causing a massive net clog up.

I think you should take a look at the article. For me, I’d really like to know that when I’m communicating from inside the US, with a site inside the US, my info-packets won’t be “inspectable” by a country whose policies I eschew and be (perhaps) put on a list for questioning should I ever decide to visit there as a tourist. I also want none of my personal information in their hands.

Source article: http://www.eweek.com/c/a/Security/Facebook-Traffic-Diverted-to-China-Raising-Privacy-Concerns-130825/


Comments (Page 3)
4 Pages1 2 3 4 
on Mar 29, 2011

^yes. https will alleviate that for facebook and any other site using it. It really shouldn't be "optional" anymore, and every 'social' site should be employing it 100% of the time.

There's simply no justification for why they aren't.

on Mar 29, 2011

DrJBHL
There's simply no justification for why they aren't.

I second the good Doc on the Yes, and while it is not a justification, I offer the following for why they are not.

Laziness.  They just have not gotten a round2it.

on Mar 30, 2011

IROKONESS

Ah to be young and innocent again. Wait young man, one day you'll be a dad and eat those words. Worry will be your middle initial also.

As a 32 year old virgin I can safely say:

Probably not.

on Mar 30, 2011


As a 32 year old virgin I can safely say:

Probably not.

Oh come on now, Savy, you aint foolin no-one with that "virgin" stuff.

on Mar 30, 2011

GG_Crew
Doesn't using HTTPS alleviate much of these concerns?  While the snooping systems might know where you are going (ie Facebook, Twitter, Battle.Net), the encrypted connection should prevent them from reading any of your personal data in a timely manner .

You can either enable HTTPS within Facebook by changing a setting in your user profile, or by manually adding the "S" to the address bar yourself.

correct. there's also an extension called "https everywhere" for firefox and pale moon. it will not, however work with any site that has no https sign on.

on Mar 30, 2011

RavenX

Oh come on now, Savy, you aint foolin no-one with that "virgin" stuff.

Girls are a distraction from the important things in life.  You know, games.

on Mar 30, 2011

Even allies do it to each other. Not too long ago an individual was caught, in the country, gathering data for Israel, sensitive data. Sorry Doc. I'm no anti-Semite. Its a matter of public record. It was reported in all the major papers. Arrested yes. Convicted of spying, no. Sent back home with a slap on the wrist. Anyone else would have been jailed.

 

The Israelis doing internet espionage don't usually operate out of Israel.  They'll operate anywhere but, so as to implicate their host country instead.  I'm dealing with an Israeli hacking case right now, and it's out of North Africa.  An entire website's database is published online--names, addresses, cracked passwords and all.  We're just lucky the database didn't store their credit card information--even though that is clearly what they were after.   And I do mean *IS* published online.  We can't take it down.  How do you?  Call the police?

on Mar 30, 2011

tetleytea

Even allies do it to each other. Not too long ago an individual was caught, in the country, gathering data for Israel, sensitive data. Sorry Doc. I'm no anti-Semite. Its a matter of public record. It was reported in all the major papers. Arrested yes. Convicted of spying, no. Sent back home with a slap on the wrist. Anyone else would have been jailed.

 

The Israelis doing internet espionage don't usually operate out of Israel.  They'll operate anywhere but, so as to implicate their host country instead.  I'm dealing with an Israeli hacking case right now, and it's out of North Africa.  An entire website's database is published online--names, addresses, cracked passwords and all.  We're just lucky the database didn't store their credit card information--even though that is clearly what they were after.   And I do mean *IS* published online.  We can't take it down.  How do you?  Call the police?

I'd try to differentiate between "doing it for Israel" as in Military Intelligence or Mossad Agency [Governmental] vs. a hacker [from anywhere] doing it. This [TetleyTea's] sounds like an individual. I don't see how credit card scams and hacked apps further Israel's national/international policy goals.

"An individual from Israel" does not mean "Israeli Intelligence".

on Mar 30, 2011

Nor would I give Israeli individuals immunity just because they're Israeli.

on Mar 30, 2011

tetleytea
The Israelis doing internet espionage don't usually operate out of Israel.  They'll operate anywhere but, so as to implicate their host country instead.  I'm dealing with an Israeli hacking case right now, and it's out of North Africa.  An entire website's database is published online--names, addresses, cracked passwords and all.  We're just lucky the database didn't store their credit card information--even though that is clearly what they were after.   And I do mean *IS* published online.  We can't take it down.  How do you?  Call the police?

The Internet is many things, but centrally controlled it is not.  In these cases, that is where it gets you.  Luckily they did not get the CC info.  The PCI standards dictate that the DB that stores that has to be firewalled off from the rest of the network.  It is a headache to employ, but at times like these, I appreciate it a lot.

on Mar 30, 2011

Girls are a distraction from the important things in life.  You know, games.

I am so not going there....

on Mar 30, 2011

tetleytea
Nor would I give Israeli individuals immunity just because they're Israeli.

Depends what's going on. You say they/he/she was given immunity because he/etc. was Israeli. I doubt you know why that happened. Could have been part of a deal, or not. Could have been a sting to find out who was passing the info and Israel (or not) was asked to help.

Who knows? Certainly neither you nor I.

on Mar 30, 2011

Dude.  Obviously I know what's going on.  It's my case.

on Mar 30, 2011

Really? That's interesting. Tell us more. You see, I really don't believe the Israeli Gov't. would get involved in a small time hacker venture for peanuts.

"An entire website's database is published online--names, addresses, cracked passwords and all."

What sort of site, and why are you/your employer involved?

on Mar 30, 2011

IROKONESS

I am so not going there....

Cool.  I didn't really like people when I was younger...and then I had no license from 18-25 so I was stuck on a farm with nowhere to go.

So whatever works.  I like not having people yelling at me so the hermit life works.

4 Pages1 2 3 4