Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

And if you don't have control of your endpoints, any network monitoring or tls mitm is meaningless anyway, as the contents can always be encrypted again inside of the tls tunnel. Then you're back to square one, the inbound/outbound traffic is inscrutable to monitoring.


It's not meaningless, since for a lot of these laws doing something like that can be evidence of willfully trying to avoid the legally mandated documentation requirements and is illegal even if they can't access your information. As long as there is a paper trail from that, you're already in trouble.


It is at least meaningless from a data loss prevention/mitigation perspective.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: