Follow

"This article will show how this hijacking works, and how China employs its… distributed points of presence (PoPs) in western democracies’ [telecom] systems to redirect internet traffic through China for malicious use. It will show… routing paths, give a summary of how one hijacks parts of the internet by inserting these nodes, and outline the major security implications."

I can't read this. The world's too much. scholarcommons.usf.edu/cgi/vie

Sign in to participate in the conversation
mastodon.cloud

Generalistic and moderated instance.
Everyone is welcome as long as you follow our code of conduct!