On 2014-01-09, Robert Moskowitz rgm@htt-consult.com wrote:
(...)
You want to talk about leaky code? Look how corporate mail proxies work to enable them to read encrypted emails. Simple lying about certs.
That sounds worrying. Could you elaborate, or provide a citation?