Hello Kathleen,

On Wed, May 23, 2018 at 9:11 PM Kathleen Moriarty <
kathleen.moriarty.i...@gmail.com> wrote:
> In section 2.2,
Do you mean 2.1?

> enterprises can still use proxy based or active
> interception solutions to enable inspection of traffic on their
> network.

Or, they can easily set up some group policy to inspect and/or block some
specific resources.
Or, in most cases they just had an unrestricted physical access to a user's
machine before, so they could have installed an arbitrary inspection app
onto it.

In case of BYOD approach, an enterprise is not in any way different from
just an arbitrary ISP.

I support removal of this case, it's virtually impossible to protect
against it.

| Artyom Gavrichenkov
| gpg: 2deb 97b1 0a3c 151d b67f 1ee5 00e7 94bc 4d08 9191
| mailto: xima...@gmail.com
| fb: ximaera
| telegram: xima_era
| skype: xima_era
| tel. no: +7 916 515 49 58

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to