Hosting

Jason Klebs jasonk at riseup.net
Thu Dec 12 12:19:57 MST 2013


Yes, and not using opportunistic encryption is something security
experts have been screaming about for years.

Also, in some more recent revelations:
http://www.washingtonpost.com/blogs/the-switch/wp/2013/12/10/nsa-uses-google-cookies-to-pinpoint-targets-for-hacking/

Because Google is not using SSL/TLS by default for every connection, the
government snoops are piggy-backing off the tracking cookie(s) Google
uses to track every search - even when not signed in.

-Jason

On 12/12/2013 12:15 PM, justin wrote:
> On Thu, Dec 12, 2013 at 11:03 AM, Grant Shipley <gshipley at gmail.com> wrote:
>
>> If the corporations didn't allow
>> government snooping there wouldn't be an issue.
>>
>
> Easier said than done. Google had to encrypt all their in-network
> replication traffic because the government was snooping on the wires their
> traffic was going over, right?
>
> --j
>
>


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 836 bytes
Desc: OpenPGP digital signature
URL: <http://plug.org/pipermail/plug/attachments/20131212/f56a6bf6/attachment.sig>


More information about the PLUG mailing list