Hacker News new | past | comments | ask | show | jobs | submit login

It's easier to do it quietly though. If there's unencrypted network traffic, they just need to demand access from someone with physical access to the switches, plant a listening device, and everyone with logical access will be blissfully unaware.

If they want to MITM encrypted traffic they need to demand access from somebody with access to the certificates, who is going to be higher paid and more likely to speak to at least a lawyer before granting access.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: