--
To UNSUBSCRIBE, email to debian-user-REQUEST@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listm...@lists.debian.org
Archive: https://lists.debian.org/551403F7...@abwesend.de
And just as well child can see a naughty picture on TV. Or a phone ad.
Or a magazine/newspaper. Anywhere, once you start thinking about it.
Whatever damage is done depends on child's state of mind, which is
influenced by his/her prior education. Which, for the most part, should
be (IMO) provided by parents first, and society (friends, school,
whatever) - second.
And internet censorship is not a substitute of education. The only
thing that censorship can teach is how to workaround it. Or that one's
parents are complete <insert_some_profanity_here>. Is that how you want
your children to perceive you?
Besides, what's up with this 15 years mark?
On Thu, 26 Mar 2015 17:18 Reco <recov...@gmail.com> wrote:
>
> Hi.
>
> On Thu, 26 Mar 2015 12:44:11 -0700
> rog...@queernet.org wrote:
>
> > On 3/26/15 12:42 PM, Michael Graham wrote:
> > > On 26 March 2015 at 14:18, Reco <recov...@gmail.com> wrote:
> > >> Then it's even worse that I thought. I don't know about Germany, but
> > >> where I live tampering with public communications is considered a
> > >> criminal offense. I strongly suggest you to seek a legal advice before
> > >> doing anything like SSL bump.
> > > Just out of curiosity where do you live? As MITM proxies in school/business
> > > seem to be pretty common in the US and the UK.
> > >
> >
> > I bet your proxy firewall does it too.
>
> Ow. Exactly which kind of consumer-grade hardware comes with SSL bump
> preinstalled? That's very interesting to me as I like know which
> hardware to avoid in the future.
It's way more common than you seem to think. CERT recently did a blog post about it and it contains a list of both hardware vendors (like Bloxx and bluecoat) as well as commercial and free software.
http://www.cert.org/blogs/certcc/post.cfm?EntryID=221
Basically if you're selling a web filter or similar security device, you let admins bump SSL.
Given how easy it is for those same admins to push the fake SSL CAs out over active directory group policy it's pretty much transparent to most naive users who don't understand the difference between https and http never mind trying to explain a MITM proxy with a fake root CA!
Cheers,