On 09/23/2013 03:17 PM, Scott Brim wrote:
>
>
> On Sep 23, 2013 2:30 AM, "Leif Johansson" <[email protected]
> <mailto:[email protected]>> wrote:
> > Instead of tilting at that windmill, would it be possible to build a
> > mechanism for making detection of 3rd party intercept tools and
> > other malware in software easy?
>
> Nice idea. Back when I tried, my experience was that it's very hard to
> distinguish good intercepts from bad ones. Would you get away from all
> middleboxes?
>
> Scott
>
I might not be able to get away from them but I would like to know they
exist.
My guess is that endpoint intercept malware will slip through the hands
of govt owners and into the hands of regular criminals at which point I
*really* do want the reporter to be able to know if the local maffioso is
running intercepts on her laptop to find out what she is going to be writing
about next...
Cheers Leif
_______________________________________________
perpass mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/perpass