Hello Kathleen, On Wed, May 23, 2018 at 9:11 PM Kathleen Moriarty < kathleen.moriarty.i...@gmail.com> wrote: > In section 2.2,
Do you mean 2.1? > enterprises can still use proxy based or active > interception solutions to enable inspection of traffic on their > network. Or, they can easily set up some group policy to inspect and/or block some specific resources. Or, in most cases they just had an unrestricted physical access to a user's machine before, so they could have installed an arbitrary inspection app onto it. In case of BYOD approach, an enterprise is not in any way different from just an arbitrary ISP. I support removal of this case, it's virtually impossible to protect against it. | Artyom Gavrichenkov | gpg: 2deb 97b1 0a3c 151d b67f 1ee5 00e7 94bc 4d08 9191 | mailto: xima...@gmail.com | fb: ximaera | telegram: xima_era | skype: xima_era | tel. no: +7 916 515 49 58 _______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls