"That letter is literally all it took for me to take control of a sub-block of someone else's public address space and get it routed to my network instead of theirs."
Interesting. I don't want some faceless central authority making it a bureaucratic nightmare to do what he's doing, but I also don't want malicious folks exploiting the vulnerability. What's the long game here? What should this process look like in 30 years?
Interesting. I don't want some faceless central authority making it a bureaucratic nightmare to do what he's doing, but I also don't want malicious folks exploiting the vulnerability. What's the long game here? What should this process look like in 30 years?