That's what bothers me about this whole thing.<div><br></div><div>The FBI will visibly redirect an entire domain to their DNS for copyright enforcement, but not tell people they are infected with malware and silently run DNS for them.</div>
<div><br></div><div>-John<br><br><div class="gmail_quote">On Sat, Jul 7, 2012 at 2:49 PM, Jonathan Lassoff <span dir="ltr"><<a href="mailto:jof@thejof.com" target="_blank">jof@thejof.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<div class="im">On Sat, Jul 7, 2012 at 2:40 PM, Jake <<a href="mailto:jake@spaz.org">jake@spaz.org</a>> wrote:<br>
> there is something obviously left out of this story, can anyone tell us<br>
> what it is?<br>
<br>
</div>Servers cost money to run.<br>
<br>
This seems like a kind thing to have done for infected users who need<br>
to fix up their machines, lest they lose connectivity.<br>
<br>
However, most of the eyeballs don't even know there's a problem when<br>
DNS "just works" with these benevolently-operated recursors. Perhaps<br>
if some big web site that was willing to take a traffic hit (google,<br>
yahoo, nytimes, etc.), this clean-up operation could have MITMed users<br>
to show them a message about their infection.<br>
<div class="HOEnZb"><div class="h5">_______________________________________________<br>
Noisebridge-discuss mailing list<br>
<a href="mailto:Noisebridge-discuss@lists.noisebridge.net">Noisebridge-discuss@lists.noisebridge.net</a><br>
<a href="https://www.noisebridge.net/mailman/listinfo/noisebridge-discuss" target="_blank">https://www.noisebridge.net/mailman/listinfo/noisebridge-discuss</a><br>
</div></div></blockquote></div><br></div>