North American Network Operators Group|
Date Prev | Date Next |
Date Index |
Thread Index |
Author Index |
Re: India cites security concerns, blocks Huawei bid to expandtheir indian ops
- From: Jim Popovitch
- Date: Wed Aug 17 18:20:20 2005
- Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=Received:Subject:From:To:Cc:In-Reply-To:References:Content-Type:Date:Message-Id:Mime-Version:X-Mailer:Content-Transfer-Encoding; b=VOtcOFyOeYMZpH6vIaBJcrTnUg6fLkluPv9xhpbf9Lkcz3Vwwq1LzJJE3+KasuiP/51E3G579Dp2MAkXNLsGPMtR9M1dXEPjfgqY0ZvB2h3Flpi0NwsSeRo7XtnCES8mpWoV0zn4mufTtbpBekvFAxmma/C321c2N1kk1EMwVKA= ;
On Wed, 2005-08-17 at 17:55 -0400, Deepak Jain wrote:
> > I assume that an Indian intelligence agency would
> > be more concerned about things like hidden remote
> > control or data collection services on the systems.
> Exactly. The Chinese version of Cisco's CALEA code with different access
> methods would be pretty threatening in general. Not saying that they
> have one, did one, or will... but its a security risk even before you
> show intent on the part of Huawei. Maybe the Indian gov't is going to
> request the source to Huawei's code? I remember Germany or Russia
> requesting it of Microsoft for Windows and Microsoft complied.
Requesting the source code and/or having access to it is really
meaningless unless you have the skill and capabilities to compile it
*and* use it. There is no sure way to know that the source code in your
left hand is what was used to compile the binary in your right hand.