Additional comment on the BREACH exploit

Without wishing to minimize the importance of this attack type, one
thing to definitely keep in mind is that this exploit involves the
interaction of a malicious website. If you've visited such a site in
the first place, in many cases all bets are already off the table --
that is, you may already have become vulnerable in a number of ways
unrelated to this particular exploit.

--Lauren--
Lauren Weinstein ([email protected]): http://www.vortex.com/lauren 
Co-Founder: People For Internet Responsibility: http://www.pfir.org/pfir-info
Founder:
 - Network Neutrality Squad: http://www.nnsquad.org 
 - PRIVACY Forum: http://www.vortex.com/privacy-info
Member: ACM Committee on Computers and Public Policy
Lauren's Blog: http://lauren.vortex.com
Google+: http://google.com/+LaurenWeinstein 
Twitter: http://twitter.com/laurenweinstein
Tel: +1 (818) 225-2800 / Skype: vortex.com
_______________________________________________
nnsquad mailing list
http://lists.nnsquad.org/mailman/listinfo/nnsquad

Reply via email to