Recall that you need both the key log AND access to the TLS connection itself.
That needs to be in real-time if you are mounting an attack that involves
modifying stuff; or packet captures if you just want to look at the content
(like with Wireshark).
This is an important point. In the securi
Prompted by Med's comment, I found this email (which I'd missed earlier). A
few points on the substance.
On Wed, May 7, 2025, at 01:49, Jean-Michel Combes via Datatracker wrote:
> Regarding the substance, IMHO, it looks like the promotion of a nightmare for
> any operational security guy :) My m