lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 7 Dec 2012 14:03:17 -0500
From: Jeffrey Walton <>
To: Gaurang Pandya <>
Cc: full-disclosure <>
Subject: Re: Nokia phone forcing traffic through proxy

On Fri, Dec 7, 2012 at 11:55 AM, Gaurang Pandya <> wrote:
> It has been noticed that internet browsing traffic, instead of directly
> hitting requested server, is being redirected to proxy servers. They get
> redirected to Nokia/Ovi proxy servers if Nokia browser is used, and to Opera
> proxy servers if Opera Mini browser is used.
> More detailed info at :
It sounds a lot like

We know proxies can cause a lot of trouble in practice. For example,

Proxies and data snatching are the reason to pin certificates when
using VPN and SSL/TLS if a pre-existing relationship exists (for
example, you know the host and its public key). Are you talking to an
Nokia/Ovi proxy, an Interception proxy (perhaps enabled by Trustwave),
or the host expected during a SSL/TLS negotiation?

We now have a much better body of knowledge. Its too bad most browser
don't offer the features for those who are security conscious. On
Android, Google went so far as to offer pinning as "opt-in" for sites:


Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia -

Powered by blists - more mailing lists