<div dir="ltr">If they could compromise potentially hundreds of thousands of servers they could likely setup a seemingly legit site, like a CentOS mirror, and take in data that looks legit.<br><br><div class="gmail_quote"><div dir="ltr">On Thu, Oct 4, 2018 at 8:54 AM John Hearns via Beowulf <<a href="mailto:beowulf@beowulf.org">beowulf@beowulf.org</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">How does the data get "back to base"Â ?<br>
I would encrypt it within an NTP or a DNS request - but that assumes<br>
outgoing NTP/DNS is not firewalled off.<br>
I guess just encrypted in an HTTP(s) payload makes sense - servers<br>
make requests to all sorts of software repositories etc.<br></blockquote></div><div><br></div></div>