I think you might find that labs like the one in Wuhan are or were being operated at arms length by US companies and individuals anyway. I doubt much will happen here, maybe some funding cuts
It would be helpful if someone would be willing to perform a packet capture while experiencing and testing this problem. I’d be more than happy to analyse further.
We should see the right number of valid ICMP packets put on the wire and whatever response we get back will be telling
Tell me what tcpdump one-liner magic you’d like and I’d be happy to provide a dump for you. I seem to be getting anywhere between 3% and 6% packet loss on my home network, pinging my server that is separated by about 6 feet of cat6 and a switch.
Wow, I can’t believe the HN audience is so accepting of stretched layer 2 as a solution. It’s almost as though we’ve been invaded by middle management.
Isn’t it better to let people underestimate us? Especially any potential adversary.
Regardless, liminal warfare will continue to give rise to this kind of scenario so we should try not to outsmart ourselves in a desperate bid to be right
> Isn’t it better to let people underestimate us? Especially any potential adversary.
Depends on the domain. Underestimation could lead to perceptions of weakness and opportunity for attack. Even if you are prepared for attack, not getting attacked in the first place is better than getting attacked at all.
The reason big companies need lots of people is because if they didn’t have lots of people they wouldn’t be a big tech company. Really, that’s about it