It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Section 4 of the Terms of Sevice!
4. Your Responsibilities as a Cisco Connect Cloud User You are responsible for any data that is sent or received by you and/or any other party in connection with your access to and/or use of the Service used in connection with your account. You agree that Cisco will not be liable to you or any others for any loss or damages due to your use of the Service.
As a condition of your use of the Service, you agree that your use of the Service in accordance with the terms and conditions of this Agreement is permitted under and will comply with the applicable laws of the country where you use the Service. You agree not to use or permit the use of the Service: (i) to invade another's privacy; (ii) for obscene, pornographic, or offensive purposes; (iii) to infringe another's rights, including but not limited to any intellectual property rights; (iv) to upload, email or otherwise transmit or make available any unsolicited or unauthorized advertising, promotional materials, spam, junk mail or any other form of solicitation; (v) to transmit or otherwise make available any code or virus, or perform any activity, that could harm or interfere with any device, software, network or service (including this Service); or (vi) to violate, or encourage any conduct that would violate any applicable law or regulation or give rise to civil or criminal liability.
While we are not responsible for any content or data that you choose to access or otherwise use in connection with the Service, we reserve the right to take such action as we (i) deem necessary or (ii) are otherwise required to take by a third party or court of competent jurisdiction, in each case in relation to your access or use or misuse of such content or data. Such action may include, without limitation, discontinuing your use of the Service immediately without prior notice to you, and without refund or compensation to you. You will indemnify and hold us and Cisco Systems Inc. and its affiliates harmless against any claims, losses or damages arising from any threatened, repudiatory or actual breach by you of the covenants set out in this Section. As part of the Service, You will be required to create a password that will enable You to use the Service. Your email address and password will be used to validate Your identity in order to access the Service. When You choose a password, choose a unique combination of letters and numbers unrelated to Your or someone else’s identity or to any information that is publicly available or that may be needed by us to provide the Service to You or to others. If you share information related to the Service with others or allow others to access the Service using Your email address and password, you have no expectation of privacy or confidentiality in the personal information you may intentionally or unintentionally disclose. Therefore, please avoid giving access to these materials to others. You agree to notify Cisco immediately of any unauthorized use of your account or password, or any other breach of security.
Be aware that harddisks are quite intelligent beasts those days. They transparently remap defective blocks. This means that the disk can keep an albeit corrupted (maybe slightly) but inaccessible and unerasable copy of some of your data. Modern disks are said to have about 100% transparent remapping capacity. You can have a look at recent discussions on Slashdot. I hereby speculate that harddisks can use the spare remapping area to secretly make copies of your data. Rising totalitarianism makes this almost a certitude. It is quite straightforward to implement some sim‐ ple filtering schemes that would copy potentially interesting data. Better, a harddisk can probably detect that a given file is being wiped, and silently make a copy of it, while wiping the original as instructed. Recovering such data is probably easily done with secret IDE/SCSI com‐ mands. My guess is that there are agreements between harddisk manufac‐ turers and government agencies. Well-funded mafia hackers should then be able to find those secret commands too. Don't trust your harddisk. Encrypt all your data. Of course this shifts the trust to the computing system, the CPU, and so on. I guess there are also "traps" in the CPU and, in fact, in every sufficiently advanced mass-marketed chip. Wealthy nations can find those. Therefore these are mainly used for criminal investigation and "control of public dissent". People should better think of their computing devices as facilities lended by the DHS.
Originally posted by 12m8keall2c
flat out hate the newer cisco routers. default guest account w/ Required password. no admin panel means of actually disabling it altogether. recently bought out dlink/linksys [don't recall exactly which] and have since turned their previously reliable products into the same jump through hoops, screwed up, craptastic admin panels as well.
Originally posted by H1ght3chHippie
This is a normal process when it comes to industry standard routers.
I hardly know any people who have a huge Cisco router at home, many of them are in the 10-20k price range or above that.
Working for a huge IT company ( Around 120.000 employees world wide ) I can assure you that there are interfaces that allow 3rd parties to access your equipment through their very own ports and services.
I admit that pushing a firmware onto your routers would be a step further, especially when it comes to consumer grade network interfaces, but it wouldn't really come as a huge surprise to me if they did.
But if you are worried about that, here's a short read that will make you re-consider your priorities:
I promise you there's a backdoor implemented from vendor side into each and every major component of your PC allowing for quick access for government agencies or police investigations. Of course that's mainly for high profile targets, not to check out the average joe ... but you get the picture.
Originally posted by XeroOne
So, if I have this straight, the router isn't exactly backdoored, but has a program (much like a root kit) that establishes a connection with Cisco's data centre when it's switched on.
Now, if CloudConnect is based in the US, it's technically subject to last year's Patriot Act revision that allows warrantless access to whatever data the router's sending to the data centre. Either that, or Cisco can provide access to the router itself on request.
Originally posted by seaez
Now it is analysis of the herd, mass trends and information that is gold
Originally posted by seaez
Scary eh? Not too mention possible Bandwidth implications.... but like I said earlier, to be honest it's not about the 3 letter agencies here, its about harvesting information. Those agencies will have your info ten ways from sunday if they want it (and they already do have it believe me).... Private companies on the other hand? They are drooling for the info that FREE sites like Facebook and Google collect and monetize, that's why they offer services for FREE.
But to sell you hardware, then try to claim sovereignty to all data and info passing through it!?
The nerve of these people... this is the start of a new war against the consumer..
Originally posted by XeroOne
Originally posted by seaez
Scary eh? Not too mention possible Bandwidth implications.... but like I said earlier, to be honest it's not about the 3 letter agencies here, its about harvesting information. Those agencies will have your info ten ways from sunday if they want it (and they already do have it believe me).... Private companies on the other hand? They are drooling for the info that FREE sites like Facebook and Google collect and monetize, that's why they offer services for FREE.
But to sell you hardware, then try to claim sovereignty to all data and info passing through it!?
The nerve of these people... this is the start of a new war against the consumer..
And that's not the only scary thing. It's funny how Cisco drops the word 'secure' into its marketing stuff isn't it? The router is a very complex beast, and in network security it's something to watch very closely. If anyone broke into a router, the network behind it gets practically raped. Even with a half-decent auditing procedure in place, we could potentially be talking about a month before it's discovered the perimeter firewall's been disabled. My money's on this happening sooner or later.
I certainly don't need to tell you that an nmap scan of random ip ranges on dsl IP's, looking for web-open admin panels with default passwords will provide shocking results, so why not let Cisco take care of improving their security.