Hi malware fighters,
They knew about this from 1998 onwards, everything that passes through the Internet and is non-encrypted is open to eavesdroppers - the man in the middle attack uses BGP (Border Gateway Protocol) to send router traffic to the attacker’s network. Everybody with a BGP router can then tap into the traffic. A demonstration was given here at the recent Defcon conference:
http://blog.wired.com/27bstroke6/files/edited-iphd-2.ppt
Everything is normal, there are no leaks, no protocol errors, no software problems. The connectivity to let it work makes it all possible. The fastest router is taken to be the best trusted to make the connection, BGP makes the fastest route prevail, but that should not be the most trusted one. The newest thing is that after viewing the traffic is delivered at the right address,
polonus