"This article will show how this hijacking works, and how China employs its… distributed points of presence (PoPs) in western democracies’ [telecom] systems to redirect internet traffic through China for malicious use. It will show… routing paths, give a summary of how one hijacks parts of the internet by inserting these nodes, and outline the major security implications."
I can't read this. The world's too much. https://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1050&context=mca
Generalistic and moderated instance.
Everyone is welcome as long as you follow our code of conduct!