[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] How much of SSL CA protected traffic is read by NSA etc. according to...?
On 01/05/2015 12:44 PM, Michael O Holstein wrote:
> (http://xkcd.com/538/) .. the only applications they have seen
> reported as "no intercept available" are OTR(*) and PGP.
>
What about OpenVPN? I've seen references to IPSEC and PPTP being
compromised, but does this also apply to OpenVPN ( based on the docs
released so far)?
Thanks.
Host
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk