>You are telling me that computers with access to Confidential data can be >internet-connected and *I* am living in lala-land. Ok.
>You actually have some good arguments in your post. This is not one of >them. :-D
You continue to be dense. Do you really think people in corporate admin have no access to confidential data? Do you really expect them to work without Internet access? When a lot of them are supposed to interact with the external environment? (and that's just one example)
>> Once a crypto tunnel is established there is no reason to rely on urls >> to transmit information. Most spam/phishing detection software relies >> heavily on url patterns to catch it
> I still can not parse this. Care to explain?
After the https handshake there is no obligation to use http at all inside the tunnel
> http proxyfication? maybe. even so, so many in the web is dynamic
> content those days, I don't think the benefit is as big as you suppose.
> https proxyfication? I highly doubt it. Just for the kick of it, I will
> download and check my smartphone's certificates, and get back to you.
media files still weight more than text. Even if your isp is not proxyfying https, that does not mean it's not proxyfing http, and when web sites switch from http to https proxies switch too