On Sun, Jun 28, 2020 at 11:09 AM Bill Barry <b...@billbarry.org> wrote:
> On Sun, Jun 28, 2020, 11:43 AM <mich...@robinson-west.com> wrote: > > > I want to bring open source high quality accountability software to Linux > > and I want the software to be supported for an extended period of time, > say > > 100 years. > > > > I have an idea to intercept tcp/udp packets destined to port 53 and all > > web and ftp traffic. The goal here is to intercept, record, reinject as > if > > nothing ever happened, and report at the end of the 24 hour period. > > > Most of the web packets at this level are encrypted to thwart this type of > spying. > I don't have enough technical knowledge to wholeheartedly agree with your statement, but I can say that there is currently a lot of effort in securing DNS and HTTP connections such as DNSSEC, DNS Over HTTPS, DNSCrypt, personal VPNs, TOR/ONION to name a few. I know there are ways to intercept HTTPS connections. I haven't delved into the technical details, but reading an article or two, it's a fairly complicated configuration and you'd have to be able to lockdown the user's computer so they couldn't just circumvent the proxy server. _______________________________________________ PLUG mailing list PLUG@pdxlinux.org http://lists.pdxlinux.org/mailman/listinfo/plug