- From: Poul-Henning Kamp <phk@phk.freebsd.dk>
- Date: Fri, 04 Dec 2015 06:44:08 +0000
- To: Piotr Galecki <piotr_galecki@affirmednetworks.com>
- cc: "ietf-http-wg@w3.org" <ietf-http-wg@w3.org>, Alex Rousskov <rousskov@measurement-factory.com>, Robert Collins <robertc@robertcollins.net>
-------- In message <2C515BE8694C6F4B9B6A578BCAC32E2F6D4E5BF6@MBX021-W3-CA-2.exch021.dom ain.local>, Piotr Galecki writes: >There are multiple use cases where a trusted intercepting proxy could come >to play. >To name a few: >- monitoring of criminal activity by authorities >- preventing leakage of secure information by rogue employees >- filtering of malware and phishing sites >- optimizing user data for delivery over congested radio network - Parental controls - Jailed inmates communication (as law permits) - Recording the comms of financial traders to prevent insider trading ... -- Poul-Henning Kamp | UNIX since Zilog Zeus 3.20 phk@FreeBSD.ORG | TCP/IP since RFC 956 FreeBSD committer | BSD since 4.3-tahoe Never attribute to malice what can adequately be explained by incompetence.
Received on Friday, 4 December 2015 06:44:33 UTC