|
On 12/04/2013 09:19 AM, Nicholas Weaver
wrote:
All it takes is ONE unencrypted web request across a hostile network for that hostile network to be used to attack the browser.And that is one way in to the browser out of many. Thanks Bruce |
_______________________________________________ perpass mailing list [email protected] https://www.ietf.org/mailman/listinfo/perpass
