Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

We had to facilitate them to set up a duplicate port to tap in to monitor that customer’s traffic. It was a 2U (two-unit) PC that we ran a mirrored ethernet port to.

[What we ended up with was] a little box in our systems room that was capturing all the traffic to this customer. Everything they were sending and receiving.

And yet his lawyer could have written a truthful denial that they'd given the govt "direct access to the server". See how that works?



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: