The very same people who tell us malware will obey our endpoint DNS configuration are busy deploying web browsers which default to doing just the opposite.https://twitter.com/taviso/status/1181760420056428544 …
You misunderstood. You need permission from the user before you start spying on them, i.e. if the endpoint is not your property or you're not authorized by the owner (e.g. you have root) you should ask the person who owns it before monitoring what they're doing, fair?
-
-
That's fair, but you seem to be misunderstanding the objections as well. We're not crying because we can't spy on people at Starbucks. We *are* authorized to monitor our endpoints and have to make security sacrifices just so folks can /change which corporation/ spies on them :(
-
I don't follow. If you're authorized to administer the endpoints, just don't use DoH and no sacrifices will be necessary?
- 14 more replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.