coderman wrote on 14.09.2007 06:39:
> On 9/13/07, scar <[EMAIL PROTECTED]> wrote:
>> ...
>> so, if we are using a website that uses HTTPS, but, in firefox, for
>> example, in the cookies list under that website it shows "Send
>> for: any type of connection", then the session is vulnerable?
>
> vul
On 9/13/07, scar <[EMAIL PROTECTED]> wrote:
> ...
> so, if we are using a website that uses HTTPS, but, in firefox, for
> example, in the cookies list under that website it shows "Send
> for: any type of connection", then the session is vulnerable?
vulnerable against a MITM that can request / inje
coderman @ 2007/09/10 18:16:
> 0. Web sites may transmit authentication tokens unencrypted
>http://www.kb.cert.org/vuls/id/466433
>... still no progress, with the companies in question dragging their
> feet...
>
> 1. World's biggest websites no match for decade-old web bug
>
> http://ww
On Mon, Sep 10, 2007 at 06:16:37PM -0700, coderman wrote:
> the spreading popularity of wireless data networks may do more for
> protecting Tor users against malicious exit nodes than any other
> efforts in progress. perhaps big names pushing the HTTPS message will
> help inform and protect users
five weeks after presenting the dangers at BlackHat, Google, eBay,
MySpace, Yahoo, Microsoft and a slew of others are still unable to
resolve the problem. [0]
the spreading popularity of wireless data networks may do more for
protecting Tor users against malicious exit nodes than any other
efforts
5 matches
Mail list logo