On Jul 17, 2017, at 14:01, Martin Thomson <martin.thom...@gmail.com<mailto:martin.thom...@gmail.com>> wrote:
My point was that you don't get that visibility when it is malware at both ends of the connection (assuming a modest amount of competency from the authors). Seeing it when it's only at one end is quite useful. And, yes, one does often see it at both ends. Assuming competence on the part of the authors is unwarranted. Why do you persist in treating this technology as theoretical & ineffective, when it's been in use quite effectively for many years? Network operators have been doing this for a long time - because it works. ----------------------------------- Roland Dobbins <rdobb...@arbor.net<mailto:rdobb...@arbor.net>>
_______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls