On 12/04/2013 09:19 AM, Nicholas Weaver wrote:
All it takes is ONE unencrypted web request across a hostile network for that hostile network to be used to attack the browser.
And that is one way in to the browser out of many.

    Thanks

    Bruce
_______________________________________________
perpass mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/perpass

Reply via email to