about DNS, it is easy to resolve, just build couple "root name servers" inside china, then have all "tier-1 service providers" in China, use "chinese root name servers"; it's easy to replicate all DNS record, NS, MX, A and so on"; by this, internet inside China just function as "intranet or extranet" the different only for us, from outside, may not use www.soho.com...
snortbsd: well, so far no one knows the exact means of those attacks, but we can be 100% sure that google systems are not microsoft windows based, which means
pekinese: about DNS, it is easy to resolve, just build couple "root name servers" inside china, then have all "tier-1 service providers" in
there was no real root server in china. used to be all of them were in the states back to early 90s.
china telecom isn't tier-1 provider, though with its enormous capacity. it is not that china telecom doesn't want to, the reason is very political. there is no centralized firewall for connecting outside. all of chinese firewalls are distributed, that is why the details of blocking a bit different from localtions to locations, depending on where you are in china...
The CRC algorithm used in the code is only published in simplified Chinese language with no author name (bad thing - they should give the original author credit for what he or she has achieved). Here is the Chinese publication:
This is a popular algorithm ONLY among Chinese programmers. It has not been used outside of China until now - the whole world is now paying attention to it. Too bad we still have no idea who the original author is.
So far, there is no single (official or unofficial) Chinese information
security experts coming out to reject the U. S. experts' claim. Once you see evidence like this, you have no doubt. What we see is similar to the DNA evidence in biology.
Please also look at the simplified Chinese words in the codes.
That is why even some pro-communist IT specialists do agree that the Chinese government is behind the Google attack took place last month.
1) the finger pointing of this proof is that this crc algorithm was originally from china and only chinese programmers know that crc algorithm.
this algorithm was free available online! as the notion of "ONLY among Chinese programmers", i really doubt on that. it would not convince me that it was free online for so long and no one in the west ever noticed. do you really think the very existence of nsa is for nothing? one can easily find chinese speaking programmers craft the code in the west and use that for their political purposes.
2) so far no any official "experts" from either google or us government come out and present their case officially. until that happens, i think china side should just ignore the fusses there or fusses here...
3) "pro-communist IT specialists"??? you??? certainly i don't buy it!!!
1) those evidences are conveniently located the supposedly compromised server in taiwan. with the status of taiwan, no one can verify that statements are true or not.
2) instead of officially charging chinese government or so, so far accusers use media campaigns and logs from "experts" lauded their accusations. hacking happens all the time, why this case pumped so much commotions? a series events before this (last year) and after this, you gotta wonder what really happening behind all of this...
there are tons of chinese codes free available online that potentially use that crc algorithm. for instance, the chinese version of linux (called red flag?) and its associated freeware; another chinese version freebsd, which is called chiling (i think, running on the chinese supercomputer) and those freeware associated with that. those two major operating systems (unix based) are free for download. even more for wintel based.
the expert blog analyzed code based on wintel, which could be from numerous sources.
it is absurd to finger pointing china as sole suspect on this matter. in fact, i strongly believe it could be a setup as prelude for a political campaign.
snortbsd: there are tons of chinese codes free available online that potentially use that crc algorithm. for instance, the chinese version of linux (called red