[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] How much of SSL CA protected traffic is read by NSA etc. according to...?



On 01/05/2015 12:44 PM, Michael O Holstein wrote:

> (http://xkcd.com/538/) .. the only applications they have seen
> reported as "no intercept available" are OTR(*) and PGP.
> 

What about OpenVPN?  I've seen references to IPSEC and PPTP being
compromised, but does this also apply to OpenVPN ( based on the docs
released so far)?

Thanks.

Host


-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk