1. Port mirroring and capturing the contents which can be used by authorities for good cause
2. Man in the middle attack , monitoring sensitive information like SSNs, login credential, jamming content like VoIP, audio,video etc
MP
--- On Sun, 4/5/09, Fred Baker <fred@cisco.com> wrote:
From: Fred Baker <fred@cisco.com> Subject: Re: draft-wbeebee-ipv6-cpe-router-04 comments To: "Mag Pat" <magrak2000@yahoo.com> Cc: "Brian E Carpenter" <brian.e.carpenter@gmail.com>, "BarbaraStark" <bs7652@att.com>, "Alan Kavanagh" <alan.kavanagh@ericsson.com>, wbeebee@cisco.com, jhw@apple.com, v6ops@ops.ietf.org, shemant@cisco.com Date: Sunday, April 5, 2009, 8:20 PM
On Apr 5, 2009, at 6:16 PM, Mag Pat wrote:
> It would be interesting to know how the end users can learn whether a service provider is monitoring without end users knowledge thereby SLA's are not breached while the security and privacy of end users remain preserved.
Whether a service provider is monitoring what?
|