On 11/07/17 22:10, Yoav Nir wrote: > If one of the parties to a conversation cooperates with the wiretap, > this isn’t an attack. Lemme try on this one again from a different angle.
In classic telephony wiretaps the carrier does the tap. There are similar situations with TLS... In hosted platforms (e.g. wordpress.com and many others) where the senders and receivers (or publishers & readers) have read and write access via PHP code and not via a shell, and cannot therefore control web or TLS configuration, the platform would be doing a wiretap if it turned this on, whilst colluding with or being coerced by some other entity that collects and later decrypts the ciphertext and packets. Are we agreed that that use-case is wiretapping via this mechanism? There are many millions of people who use such constrained hosted environments. Cheers, S.
signature.asc
Description: OpenPGP digital signature
_______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls