Comment by Aurornis
5 days ago
> Almost 80% of communications go through a data center in Northern VA
Nobody who understands the scale of the internet could possibly believe this is true.
Routing internet traffic through a geographical location would increase ping times by a noticeable amount.
Even sending traffic from around the world to a datacenter in VA would require an amount of infrastructure multiple times larger than the internet itself to carry data all that distance. All built and maintained in secret.
He was likely referring to the claim that 70% of the internet flows through Loudon County, Virginia, where AWS us-east-1 is located, although the more accurate number is probably somewhere around 22%.
https://en.wikipedia.org/wiki/Loudoun_County,_Virginia#Econo...
Every cloud provider worth talking about is there too. Both public and sovereign/gov data centers.
And of course all the privately owned ones too. It is bananas. Not just because of government either - low ping times to the biggest population center of North America.
> Nobody who understands the scale of the internet could possibly believe this is true.
Neither would anybody have believed that 8 out of 10 hard drive chips can contain any rootkits. Yet, here we are, and the insanity of it is that we've found lots of malware attributed to EQGRP, and the Snowden leaks (from the perspective of Booz Allen) have confirmed it.
You should read up on quantum routing.
They don't have to route through any specific location if they can just infiltrate the routers of your neighbors. Any data packet from the originating server will arrive slower at your location than the data packet of your neighbor. In that scenario TLS becomes pretty useless if the CA itself is also exchangeable, because you can't rely on TCP or UDP. Ironically the push for UDP makes it much easier to implement in the underlying token ring architectures and their virtual routing protocols like VC4 and later.
That's how the internet and a star topology (or token ring topology on city level) was designed.
> Neither would anybody have believed that 8 out of 10 hard drive chips can contain any rootkits. Yet, here we are
I haven't heard this before. Do you have any links I can read on this?
https://en.wikipedia.org/wiki/Equation_Group
Check the snowden leaks for IRATEMONK and TAO (tailored access operations) related documents.
I wish I could upvote this more than once.
Just because your client is in Switzerland and your data center is in Germany, doesn’t mean a data center in Virginia doesn’t have a copy.
https://youtu.be/JR6YyYdF8ho
That was 14 years ago…
We have MUCH more capabilities today.
The datacenter is in Utah, not Virginia.
https://en.wikipedia.org/wiki/Utah_Data_Center
That’s cold storage
1 reply →
It's referring to us-east-1
1 reply →
Do you have a single actual source for anything you’re saying about this happening today?
I’m well aware of the historical surveillance programs. I’m asking for a source for all of your claims about what’s happening today regarding 80% of internet traffic.
That claim makes no sense in today's world. For over a decade, the likes of Youtube, Netflix and short form video make the majority of throughput. Why in the world would anyone want to monitor known catalogs of content? Most of which are delivered by POPs in data centers distributed all over the world.
https://www.bbc.com/news/articles/c93dnnxewdvo
As for traffic, I can’t cite numbers, you’ll just have to trust me when I say it. I can’t give you packet breakdown or IP4 vs IP6. To have that discussion requires a secret clearance at least.
6 replies →
Never tapped a port, eh?
Edited to not be so flippant: I work in HFT/finance where recording all traffic is required I think by law and definitely for one's own sanity. We're able to maintain nanosecond trades while capturing ALL the traffic. It has zero impact on the traffic. This is normal, widely used tech. Think stuff like Ixia passive taps and/or Arista Metamako FPGA-based tap/mux devices.
> Never tapped a port, eh?
I have. I have a background in high speed networking.
Have you ever paused for a moment to consider how much infrastructure would be required to send 80% of data on the internet across the country and into a single datacenter in Virginia?
If you've worked in HFT, you can probably at least start to imagine the scale we're talking about.
It’s not a single data center, it’s about 200 of them.
9 replies →
the time it takes for light to travel from los angeles to virginia is 12 - 16 ms, round trip is 30ms lets say - that is a noticeable delay, and it could be easily disproven that 80% of traffic is literally routed through VA
now.. could they just copy the traffic and send it to VA on a side channel? probably?
And how useful would this information be? srcIP:port_dstIP:port pairs with almost all traffic encrypted. Pretty boring from a sigint pov.
Instagram, YouTube, misc Web traffic, and torrents, with a side of minutae.
I'm certain the three letter agencies yearn for the days before letsencrypt was de facto.
2 replies →
i used to work, 15 years ago, on a (permissive, not covert) monitoring service for a UK national public service, the NHS spine core. We used switches to mirror ports and capture traffic in promisciouse mode on a few dozen servers split across a few datacentres that all the traffic went througg. We had certs installed to decode https. We could get enough hardware to do this step easily, but fast enough storage was an issue, we had 1 petabyte of usable storage across all sitesn that could hold a few days of content. We aimed to get this data filtered and forwarded into our central Splunk (seperate storage) and also into our bespoke dashboards within 60s. We often lagged...
2 replies →
The point they were making was that you could tell via ping times if the traffic was literally being routed through VA unnecessarily because the extra unavoidable light speed delay that extra distance would add between a user and the server if they weren't already very near to VA. Could be mirrored via the type of monitoring you're talking about but that'd only get you mostly encrypted traffic unless the 90s cypherpunk paranoia turns out to have been true.
But you are only tapping your own data that's already passing by you not? Not 80% of the internet that has nothing to do with you.