Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> Arguably network operators have the ultimate authority on what should and shouldn't happen over their networks on their equipment.

I think the point here is you write on their equipment. I was talking about cases where the network owner don't control the endpoints, that is allowing private devices to connect. snooping in that data can be problematic.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: