lewstherin
Senior Member
- Joined
- Jan 8, 2004
- Messages
- 968
i think the actual communications protocols are decently secure (although some techie could have forgotten a back door). If abuse has been taking place it would be in the form of tapping into the towers directly or through "inside jobs" - getting 512K account 4 free. ppl I've spoken with have suggested that such hacked accounts are being resold ISP style, and hence are being continuously maxed out - imagine 10 x 512K connections (that are not on Sentech's books, hence not budgeted bandwidth wise) in permanent use!
<font color="blue">Telkom needs a leash, ICASA needs some guts, and the </font id="blue"><font color="red">SA consumer</font id="red"><font color="blue"> needs to make it happen</font id="blue">
<font color="blue">Telkom needs a leash, ICASA needs some guts, and the </font id="blue"><font color="red">SA consumer</font id="red"><font color="blue"> needs to make it happen</font id="blue">