On 2014-01-09, Robert Moskowitz <rgm at htt-consult.com> wrote: (...) > You want to talk about leaky code? Look how corporate mail proxies work > to enable them to read encrypted emails. Simple lying about certs. That sounds worrying. Could you elaborate, or provide a citation? -- Liam