lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CAH8ZuZpVRNJE+msKQz_8nGkGy7t30ZZwkmLfcOet2DUQ8F80jA@mail.gmail.com> Date: Thu, 22 Sep 2011 18:01:10 -0300 From: Fosforo <fosforo@...il.com> To: full-disclosure@...ts.grok.org.uk Subject: [OT] Security in general using HTTPS Maybe not related to full disclosure in general, but anybody knows if there is a way to track/identify the certificate authorities which "sold" these kind of black boxes that changes HTTPS certificates on-the-fly, tracking users without notice ? -- []s Fosforo ------------------------------------------------------------- Bcz sex is like hacking.. you get in, you get out, and you hope you didn't leave something behind that can be traced back to you.. ------------------------------------------------------------- http://insanenetworks.blogspot.com ------------------------------------------------------------- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists