Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Welcome to the reality of most of the "information security" business, which is mostly just compliance by checkbox. A significant proportion of encrypted Internet traffic that is transiting government agencies or major enterprises gets decrypted in flight for inspection, literally inserting a black-box with privileged MITM capabilities into otherwise secure protocols, purely for the purpose of checking a compliance box, and that's not even the worst sin.

There's no insecurity like compliant cybersecurity :)



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: