You are telling me that computers with access to Confidential data can be internet-connected and *I* am living in lala-land. Ok.
You actually have some good arguments in your post. This is not one of them. :-D
> Once a crypto tunnel is established there is no reason to rely on urls to transmit information. Most spam/phishing detection software relies heavily on url patterns to catch it
I still can not parse this. Care to explain?
> ROTFL. The biggest thing that happened Internet-side those past years are smartphones, and if you think ISPs let them connect to the Internet without proxyfication, you're naïve
http proxyfication? maybe. even so, so many in the web is dynamic content those days, I don't think the benefit is as big as you suppose. https proxyfication? I highly doubt it. Just for the kick of it, I will download and check my smartphone's certificates, and get back to you.