TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Ask HN: How to defend against SSL visibility appliances?

1 点作者 BCharlie超过 10 年前
Recently on Tor Talk, there was a discussion of SSL visibility appliances (https:&#x2F;&#x2F;www.bluecoat.com&#x2F;products&#x2F;ssl-visibility-appliance). They are able to strip out SSL transparently (good article here: http:&#x2F;&#x2F;www.zdnet.com&#x2F;how-the-nsa-and-your-boss-can-intercept-and-break-ssl-7000016573&#x2F;).<p>Are there any effective means to audit trusted CA&#x27;s in browsers, so that none of these vendors are in the list? Manually reviewing every CA obviously isn&#x27;t an option.<p>Does anyone have any good plugin suggestions, or defensive techniques?

2 条评论

BCharlie超过 10 年前
I should also mention that I am not asking about defenses in particular applications, such as Tor, which does include hardcoded certs. I am more interested in everyday use while not using specialized services such as VPN clients and Tor.
TheLoneWolfling超过 10 年前
Certificate pinning helps, although it obviously doesn&#x27;t prevent an attack against something you haven&#x27;t seen before.