@Pinboard lots of fun stuff you can do with BGP http://www.slate.com/articles/technology/future_tense/2014/08/bgp_hijacking_cybercriminals_used_internet_architecture_to_mine_bitcoins.html …
-
-
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
@Pinboard Not anymore. You could break directly connected, badly config'd BGP neighbors. Good peers limit # and content of routes received. -
@sanjuanswan cool, thanks for the informative answer - Show replies
New conversation -
-
-
@Pinboard Back in the day you could: http://flix.flirble.org/Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
@Pinboard Much easier to wreak routing havoc w/ prefix hijacking (pretending to be somebody else), or DoSing BGP on badly protected routers. -
@sanjuanswan one of my life’s goals is to never be responsible for a router or routing table. Life is scary enough at the edges
End of conversation
New conversation -
-
-
@Pinboard wouldn't require millions of routes, just a few put in in the right places would mess with a good chunk of itThanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
@Pinboard Much easier to just broadcast fake routes and take over traffic. Much more fun.Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.