29 Years of the Digest ... founded August 21, 1981
The Telecom Digest for August 09, 2011
====== 29 years of TELECOM Digest -- Founded August 21, 1981 ======
Telecom and VOIP (Voice over Internet Protocol) Digest for the
Internet. All contents here are copyrighted by Bill Horne and
the individual writers/correspondents. Articles may be used in other
journals or newsgroups, provided the writer's name and the Digest are
included in the fair use quote. By using -any name or email address-
included herein for -any- reason other than responding to an article
herein, you agree to pay a hundred dollars to the recipients of the
Addresses herein are not to be added to any mailing list, nor to be sold or given away without explicit written consent. Chain letters, viruses, porn, spam, and miscellaneous junk are definitely unwelcome.
We must fight spam for the same reason we fight crime: not because we are naive enough to believe that we will ever stamp it out, but because we do not want the kind of world that results when no one stands against crime. - Geoffrey Welsh
See the bottom of this issue for subscription and archive details and the name of our lawyer, and other stuff of interest.
Date: Sun, 7 Aug 2011 23:20:47 -0400 From: Monty Solomon <email@example.com> To: firstname.lastname@example.org. Subject: AT&T to revoke unlimited data plans from some users Message-ID: <email@example.com> AT&T To Revoke Unlimited Data Plans From Jailbreaking iPhone Tetherers By Casey Johnston August 5, 2011 AT&T will begin revoking unlimited data plans from customers who jailbreak their iPhones to use unauthorized tethering services, the company confirmed to Boy Genius Report today. AT&T's action applies to all customers tethering on the sly, whose monthly bills will automatically have AT&T's 4GB tethering-approved plan added to them if they continue to tether past a certain date. ... http://www.wired.com/epicenter/2011/08/att-revoke-unlimited-data/ ***** Moderator's Note ***** For those of us not yet tethered to a digital fire hydrant, some definitions might be in order. Bill Horne Moderator
Date: Sun, 07 Aug 2011 19:10:24 -0400 From: Barry Margolin <firstname.lastname@example.org> To: email@example.com. Subject: Re: AT&T increases voice mail security Message-ID: <barmar-77F668.firstname.lastname@example.org> In article <email@example.com>, Graham <firstname.lastname@example.org> wrote: > This is very interesting because it's the first time I have seen in > print (as it were) that the News International voicemail intercepts > were achieved by using the "handset's own CLI" exploit rather than > guessing at the PIN. Where in the article did it say that this is how these hackers did it? I wouldn't be surprised if that's what they did, but there was no confirmation of it. I'm surprised that this works on a cellular network. Can't they identify cellphones by their SIM cards? -- Barry Margolin, email@example.com Arlington, MA *** PLEASE post questions in newsgroups, not directly to me ***
Date: Mon, 08 Aug 2011 17:03:37 -0400 From: tlvp <tPlOvUpBErLeLsEs@hotmail.com> To: firstname.lastname@example.org. Subject: Re: AT&T increases voice mail security Message-ID: <email@example.com> On Sun, 07 Aug 2011 19:10:24 -0400, Barry Margolin <firstname.lastname@example.org> wrote: > ... Can't they identify cellphones by their SIM cards? Sure they can. But they can't identify the owner of the hand that's holding the cellphone they've identified the SIM card in. Cheers, -- tlvp -- Avant de repondre, jeter la poubelle, SVP
Date: Mon, 8 Aug 2011 11:25:17 -0500 From: John Mayson <email@example.com> To: firstname.lastname@example.org. Subject: Re: AT&T to revoke unlimited data plans from some users Message-ID: <CALtjCnLjxmnhS4QnFX3dTyqQj78pO=1LAOE20uDUSho_QEAF6Q@mail.gmail.com> Speaking of tethering (i.e. sharing your phone's broadband connection with other devices), can someone explain to me the justification for charging extra for this? I pay my provider $X for 2 GB of data per month. How does it cost them more if I use this data with my laptop versus my phone? My phone can only RX/TX bits so fast, so it's not like I'm hogging bandwidth. I can't help but think it's just a way for them to make more money. If there's a technical reason that I'm not understanding, I'd love to hear it. John -- John Mayson <email@example.com> Austin, Texas, USA
Date: Mon, 08 Aug 2011 17:07:23 -0400 From: tlvp <tPlOvUpBErLeLsEs@hotmail.com> To: firstname.lastname@example.org. Subject: Re: AT&T to revoke unlimited data plans from some users Message-ID: <email@example.com> On Mon, 08 Aug 2011 12:25:17 -0400, John Mayson <firstname.lastname@example.org> wrote: > Speaking of tethering (i.e. sharing your phone's broadband connection > with other devices), can someone explain to me the justification for > charging extra for this? > ... > I can't help but think it's just a way for them to make more money. > If there's a technical reason that I'm not understanding, I'd love to > hear it. You just gave it: "it's ... a way for them to make more money." :-) Cheers, -- tlvp -- Avant de repondre, jeter la poubelle, SVP
Date: Mon, 8 Aug 2011 18:07:49 +0000 (UTC) From: danny burstein <email@example.com> To: firstname.lastname@example.org. Subject: "splicing" into a fiber optic trunk Message-ID: <email@example.com> Anyone familiar with, or can point to, a "how to" in regards to splicing (term used loosely) into a telecom fiber line? It's a legit purpose... We've got an actual _alternative_, as in second option, facilities based telco near a site I'm helping spec. Actually three options.. there's the entrenched telco, there's a real local company with its own physical plant, and there a cableco. The building already has copper from all three, with individual offices choosing which ones to use. We'd love to get a fiber run into the complex. The independent telco has a fiber run about 100 feet away. We're just starting the discussion with them, but I'd like to have enough info to be dangerous in the negotiations. So... the key question is... can they "splice" into the fiber that's just about next door, or do they have to run a new line the distance to the CO. for that matter, how do they physically do splicing these days? would it be passive mirrors, or a Magic Box [tm] that would get installed on the pole? All info appreciated. Thanks -- _____________________________________________________ Knowledge may be power, but communications is the key firstname.lastname@example.org [to foil spammers, my address has been double rot-13 encoded]
TELECOM Digest is an electronic journal devoted mostly to telecom- munications topics. It is circulated anywhere there is email, in addition to Usenet, where it appears as the moderated newsgroup 'comp.dcom.telecom'. TELECOM Digest is a not-for-profit, mostly non-commercial educational service offered to the Internet by Bill Horne. All the contents of the Digest are compilation-copyrighted. You may reprint articles in some other media on an occasional basis, but please attribute my work and that of the original author. The Telecom Digest is moderated by Bill Horne.
|Contact information:||Bill Horne|
43 Deerfield Road
Sharon MA 02067-2301
bill at horne dot net
This Digest is the oldest continuing e-journal about telecomm- unications on the Internet, having been founded in August, 1981 and published continuously since then. Our archives are available for your review/research. We believe we are the oldest e-zine/mailing list on the internet in any category! URL information: http://telecom-digest.org Copyright (C) 2009 TELECOM Digest. All rights reserved. Our attorney is Bill Levant, of Blue Bell, PA. --------------------------------------------------------------- Finally, the Digest is funded by gifts from generous readers such as yourself who provide funding in amounts deemed appropriate. Your help is important and appreciated. A suggested donation of fifty dollars per year per reader is considered appropriate. See our address above. Please make at least a single donation to cover the cost of processing your name to the mailing list. All opinions expressed herein are deemed to be those of the author. Any organizations listed are for identification purposes only and messages should not be considered any official expression by the organization.