Bob Mottram před 9 roky
rodič
revize
e9d8f4aba9
1 změnil soubory, kde provedl 11 přidání a 1 odebrání
  1. 11
    1
      website/EN/usage.html

+ 11
- 1
website/EN/usage.html Zobrazit soubor

@@ -4,7 +4,7 @@
4 4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
5 5
 <head>
6 6
 <title></title>
7
-<!-- 2015-10-06 Tue 20:21 -->
7
+<!-- 2015-10-28 Wed 22:51 -->
8 8
 <meta  http-equiv="Content-Type" content="text/html;charset=utf-8" />
9 9
 <meta  name="generator" content="Org-mode" />
10 10
 <meta  name="author" content="Bob Mottram" />
@@ -287,6 +287,16 @@ If you wish to only use ssh keys then log in to the Freedombone and edit <b>/etc
287 287
 <p>
288 288
 Port 465 is used for SMTP and this is supposedly deprecated for secure email. However, using TLS from the start of the communications seems far more secure than starting off with insecure communications and then trying to upgrade it with a command to begin TLS, as happens with STARTTLS. There are <a href="https://www.eff.org/deeplinks/2014/11/starttls-downgrade-attacks">possible attacks against STARTTLS</a> in which the command to begin secure communications is removed or overwritten which could then result in email being transferred in plain text over the internet and be readable by third parties.
289 289
 </p>
290
+
291
+<p>
292
+From <a href="http://motherboard.vice.com/read/email-encryption-is-broken">http://motherboard.vice.com/read/email-encryption-is-broken</a>:
293
+</p>
294
+
295
+<blockquote>
296
+<p>
297
+The researchers also uncovered mass scale attacks of STARTTLS sessions being stripped of their encryption. That attack itself isn't new: internet service providers sometimes do it to monitor users; organizations may use it to keep an eye on employees; or it may come from a malicious actor
298
+</p>
299
+</blockquote>
290 300
 </div>
291 301
 </div>
292 302
 <div id="outline-container-orgheadline11" class="outline-3">