122
edits
(Fix link) |
(Order matters.) |
||
Line 9: | Line 9: | ||
I believe we can get the information we need without transmitting any information about the certificate we receive, so this should be anonymous, breaking users down into 4 buckets: | I believe we can get the information we need without transmitting any information about the certificate we receive, so this should be anonymous, breaking users down into 4 buckets: | ||
# Users who are behind a MITM proxy using SHA-1 with a built-in root | |||
# Users who are behind a MITM proxy using SHA-1 with an imported root | # Users who are behind a MITM proxy using SHA-1 with an imported root | ||
# Users who are behind a MITM proxy not using SHA-1 | # Users who are behind a MITM proxy not using SHA-1 | ||
# Users who are not behind a MITM proxy | # Users who are not behind a MITM proxy |
edits