It wouldn't be. When the endpoint in question is compromised, there isn't any 
amount of tunneling or obscurity between point a and point b that will resolve 
it. Only thing you can do is change to a solution that you have more control 
over.
Sent on the TELUS Mobility network with BlackBerry

-----Original Message-----
From: Warren Bailey <wbai...@satelliteintelligencegroup.com>
Date: Sat, 13 Jul 2013 00:12:37 
To: Nick Khamis<sym...@gmail.com>; Justin M. Streiner<strei...@cluebyfour.org>
Reply-To: Warren Bailey <wbai...@satelliteintelligencegroup.com>
Cc: nanog@nanog.org<nanog@nanog.org>
Subject: Re: Office 365..? how Microsoft handed the NSA access to encrypted
 messages

That doesn't sound like it would be effective in this instance?


Sent from my Mobile Device.


-------- Original message --------
From: Nick Khamis <sym...@gmail.com>
Date: 07/12/2013 1:06 PM (GMT-08:00)
To: "Justin M. Streiner" <strei...@cluebyfour.org>
Cc: nanog@nanog.org
Subject: Re: Office 365..? how Microsoft handed the NSA access to encrypted 
messages


We are currently working on something right now where all connections
are doing over an encrypted vpn. We are bringing SIP, email, search,
and cloud to the tunnel.

You can contact me off list if you would like to know more.

Nick Khamis

Reply via email to