On Sun, Jun 28, 2020 at 11:09 AM Bill Barry <b...@billbarry.org> wrote:

> On Sun, Jun 28, 2020, 11:43 AM <mich...@robinson-west.com> wrote:
>
> > I want to bring open source high quality accountability software to Linux
> > and I want the software to be supported for an extended period of time,
> say
> > 100 years.
> >
> > I have an idea to intercept tcp/udp packets destined to port 53 and all
> > web and ftp traffic. The goal here is to intercept, record, reinject as
> if
> > nothing ever happened, and report at the end of the 24 hour period.
>
>

> Most of the web packets at this level are encrypted to thwart this type of
> spying.
>

I don't have enough technical knowledge to wholeheartedly agree with your
statement, but I can say that there is currently a lot of effort in
securing DNS and HTTP connections such as DNSSEC, DNS Over HTTPS, DNSCrypt,
personal VPNs, TOR/ONION to name a few.

I know there are ways to intercept HTTPS connections. I haven't delved into
the technical details, but reading an article or two, it's a fairly
complicated configuration and you'd have to be able to lockdown the user's
computer so they couldn't just circumvent the proxy server.
_______________________________________________
PLUG mailing list
PLUG@pdxlinux.org
http://lists.pdxlinux.org/mailman/listinfo/plug

Reply via email to