On Jul 17, 2017, at 14:01, Martin Thomson 
<martin.thom...@gmail.com<mailto:martin.thom...@gmail.com>> wrote:

 My point was that you
don't get that visibility when it is malware at both ends of the
connection (assuming a modest amount of competency from the authors).

Seeing it when it's only at one end is quite useful.

And, yes, one does often see it at both ends.   Assuming competence on the part 
of the authors is unwarranted.

Why do you persist in treating this technology as theoretical & ineffective, 
when it's been in use quite effectively for many years?

Network operators have been doing this for a long time - because it works.

-----------------------------------
Roland Dobbins <rdobb...@arbor.net<mailto:rdobb...@arbor.net>>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to