@CodingExon I tweeted a paper a few days back about "Security" products, and many of them did SHA-1 interception certs & would cause this
@sleevi_ @CodingExon I'm probably overstating that for the general case. But, it's probably true for many "I'll sign anything" MitM proxies.
-
-
@BRIAN_____@CodingExon@ttaubert@rlbarnes I'm increasingly getting convinced that trying to stop dumb (AV/intercept) is pointless :( -
@sleevi_@CodingExon@ttaubert Personally, I think Firefox should just not even bother w/ workarounds. Give expensive users to Chrome & IE. -
@BRIAN_____@sleevi_@ttaubert Interesting point (CC@rlbarnes). We should see how many users we're talking about, but I probably agree.
End of conversation
New conversation -
-
-
@BRIAN_____@sleevi_@CodingExon MITM proxies does not sign public keys from random users. -
@yuhong2@BRIAN_____@CodingExon Subject & extns are usually copied over verbatim -
@sleevi_@yuhong2@CodingExon If so then deploying Must-Staple will have similar problems (as mentioned on the TLS list way back). -
@sleevi_@BRIAN_____@yuhong2@CodingExon you expect MITM to just copy must-staple extension blindly? - End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.