netflow in the core used for surveillance

Brandon Svec bsvec at teamonesolutions.com
Wed Aug 25 21:22:39 UTC 2021


I would go on the assumption they do (or allow others to), always have and
always will.  And if not this way, they will find other ways such as one
infamous example-

https://en.wikipedia.org/wiki/Room_641A
*-Brandon*


On Wed, Aug 25, 2021 at 2:16 PM Randy Bush <randy at psg.com> wrote:

> https://www.vice.com/en/article/jg84yy/data-brokers-netflow-data-team-cymru
>
> used to get dissidents, activists, and journos killed
>
> at&t, comcast, ... zayo, please tell us you do not do this.
>
> randy
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.nanog.org/pipermail/nanog/attachments/20210825/3fcc64dc/attachment.html>


More information about the NANOG mailing list