There are total bypass options now to completely remove their hardware from your network using an ONT that lets you clone the att device serial number. Just a heads up.
There are total bypass options now to completely remove their hardware from your network using an ONT that lets you clone the att device serial number. Just a heads up.
You forgot to say unsubscribe
It’s just a feed posting stories from https://news.ycombinator.com/ which at times has good stuff and relatively insightful user discussions.
You aren’t giving us enough information to even speculate the answer. Are these Enterprise grade servers in a datacenter? Are these home made servers with consumer or low grade hardware you’re calling servers? Are they in the same datacenter or do they go out to the Internet? What exists between the hops on the network? Is the latency consistent? What is the quality of both sides of the connection? Fiber? Wi-Fi? Mobile? Satellite?
Does it drop too nothing or just settle into a constant slower speed? What have you tried to trouble shoot? Is it only rsync or do other tests between the hosts show the same behavior?
Give us more and you might get some help. If these hosts are Linux I would start with iperf to do a more scientific test. And report to us some more info.
Yeah the previous bypass used a certificate that you’d have to authenticate periodically via 802.1x. This new method does not have that requirement. Just need the specialized hardware for it, like that Azores d20 box or one of the SFP+ xgs-pon modules that you can program.
I’ve been using it without any intervention for a little over a 8 months now. Even have my /29 static IP block allocated on it, while still being able to also use the DHCP address they give out. You get to use the whole /29 too without the att box stealing one of them as well.
I think the originator of it was on dslreports but I couldn’t find the link on mobile. I’m sure if you can search on Google you could find a secondary source for some tech blog or medium about it if that makes you feel better. There’s also a discord that covers most xgs-pon bypass methods that I could share too. They keep turning it to private at times for whatever reason.
Other links and info of you are being serious and not passive aggressive. ATT is quick with DMCA takedowns so that’s probably why the info can be fleetingly available at times but dslreports seems to be pretty reliable/resistant to them.
https://www.dslreports.com/forum/r33665048-AT-T-Fiber-XGS-PON-SFP-Modules-for-AT-T-Fiber
https://hackaday.io/project/193110-bypassing-the-bgw-320-using-an-azores-cots-ont
https://forum.netgate.com/topic/99190/att-uverse-rg-bypass-0-2-btc/440
https://simeononsecurity.com/guides/bypassing-the-bgw320-att-fiber-modem-router/
You can totally bypass ATT Fiber now with your own SFP+ xgs-pon, fiber terminated to your device, without needing to exfil certs or do anything other than clone the identifying info of the att router’s label depending on the technology they’re using in your area.
An organization that opposes the Galactic Empire. The Alliance is a coalition of rebel cells and resistance groups that formed in response to the Empire’s authoritarian rule.
Not sure either. Maybe they set the default app for handling the mailto: protocol to :(){ :|:& };:
or something to make life interesting?
I might have a few hours a month to help out if there’s something I feel I can help with.