Hacker News new | past | comments | ask | show | jobs | submit login

By way of example: TLS 1.3 eliminated the RSA key exchange, which breaks passive decryption of TLS, which was a common enterprise security technique.



Hmm, thanks. But that only works when the passive eavesdropper has the server private key (right?). That seems quite limiting if you want to have "visibility" into network traffic?

I don't really understand the full picture / use case here. Is it only for internal traffic, or is it used in combination with some other more active mitm method to act as the server even for e.g gmail.com?


Yes.




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: