TLS telstra group limited

Where to now for long term investors of Telstra, page-12519

  1. 6,359 Posts.
    lightbulb Created with Sketch. 508
    Some one pointed me to this article about why China 5G/Huawei was banned. I always thought its an overreactions. But it seems BGP, Floptus excuse, how we connect to the internet/rest of world is a highly critical, national security issue. I for one, hope TLS does its jobs in this. As a TLS shareholder, I'm guessing, TLS do not want to "touch" a poisoned network like floptus in cases like this. How can you ensure, their "routes" are accurate? Would this not add extra expenses by allowing something like this to happen?

    I'm not saying TLS might not be culpable for future outages/breakage. I'm just saying, as a publicly listed company in Australia, there are recourse, as a nation, as shareholders that are citizens to do stuff about it. While if it Floptus, its a foreign owned entity. I'm thinking of the recent saga of QAN as an example, how eventually, shareholders anger forced change in the company. Floptus took 2 major scandal/outage, year on year for its CEO to resign. Even Alan Joyce wasn't so blatant in his excess. TLS might be TeleSCUM, but its at least our SCUM.

    This might be why this thread is going for so long. We are all TLS shareholders.

    Disclaimer: Not a network engineer.

    https://arstechnica.com/information-technology/2019/06/bgp-mishap-sends-european-mobile-traffic-through-china-telecom-for-2-hours/

    THANKS, BGP. —

    BGP event sends European mobile traffic through China Telecom for 2 hours

    Improper leak to Chinese-government-owned telecom lasts up to two hours.

    A graphical depiction of Thursday's BGP leak.
    Enlarge/ A graphical depiction of Thursday's BGP leak.
    130 with

    Traffic destined for some of Europe's biggest mobile providers was misdirected in a roundabout path through the Chinese-government-controlled China Telecom on Thursday, in some cases for more than two hours, an Internet-monitoring service reported. It's the latest event to stoke concerns about the security of the Internet's global routing system, known as the Border Gateway Protocol.

    The incident started around 9:43am UTC on Thursday (2:43am California time). That's when AS21217, the autonomous system belonging to Switzerland-based data center colocation company Safe Host, improperly updated its routers to advertise it was the proper path to reach what eventually would become more than 70,000 Internet routes comprising an estimated 368 million IP addresses. China Telecom's AS4134, which struck a network peering arrangement with Safe Host in 2017, almost immediately echoed those routes rather than dropping them, as proper BGP filtering practices dictate. In short order, a large number of big networks that connect to China Telecom began following the route.

 
Add to My Watchlist
What is My Watchlist?
A personalised tool to help users track selected stocks. Delivering real-time notifications on price updates, announcements, and performance stats on each to help make informed investment decisions.
(20min delay)
Last
$4.97
Change
0.000(0.00%)
Mkt cap ! $56.58B
Open High Low Value Volume
$4.97 $4.98 $4.95 $131.7M 26.50M

Buyers (Bids)

No. Vol. Price($)
3 19027 $4.96
 

Sellers (Offers)

Price($) Vol. No.
$4.97 82784 5
View Market Depth
Last trade - 16.10pm 31/07/2025 (20 minute delay) ?
TLS (ASX) Chart
arrow-down-2 Created with Sketch. arrow-down-2 Created with Sketch.