"the Tunisian ISPs appeared to be running a giant man-in-the-middle keylogger system..."
Sorry if this sounds pedantic, but you (and the source) should make the distinction between keylogging (a local action) and the packet reading of unencrypted HTTP traffic to find clear text passwords. These two methods are quite different and constitute very different levels of intrusion. These two methods also take two very different approaches to guard against.
p.s. Keep up the great work Mike; I truly appreciate all the work you put into Techdirt!/div>
Techdirt has not posted any stories submitted by ajnachakra.
keylogging != unencrypted packet reading
Sorry if this sounds pedantic, but you (and the source) should make the distinction between keylogging (a local action) and the packet reading of unencrypted HTTP traffic to find clear text passwords. These two methods are quite different and constitute very different levels of intrusion. These two methods also take two very different approaches to guard against.
p.s. Keep up the great work Mike; I truly appreciate all the work you put into Techdirt!/div>
Techdirt has not posted any stories submitted by ajnachakra.
Submit a story now.