Design for security
Design for security
Posted Feb 22, 2019 19:36 UTC (Fri) by mpr22 (subscriber, #60784)In reply to: Design for security by fest3er
Parent article: Design for security
One does not have to believe oneself to be a Designated Undesirable to prefer that one's internet traffic be end-to-end encrypted rather than per-hop encrypted.
My ISP's gateway, my bank's ISP's gateway, and the six other gateways between my ISP's gateway and my bank's ISP's gateway have no business being able to know my access credentials for my bank's online services.
