Quote:
Originally Posted by unicus
I also thought about this and questioned it here #2176 though I had initially forgotten about certification. After subsequent reading, including this, I have come to the conclusion that using this deep packet equipment would make a 'man-in-the-middle' attack possible. Now if someone working for Phorm were not trustworthy...
|
This is the "Thick" end of the wedge, the things they could do. We don't trust them, so we think they might. I agree.
We do need to be careful though about how we challenge them
now.
We need to differentiate, particulary at the meeting, between this (what they could do) and what the have done and are known to be planning.
Otherwise they will lump all accusations into the same category of "no evidence".