Security/CryptoEngineering/SHA-1: Difference between revisions

Jump to navigation Jump to search
Order matters.
(Fix link)
(Order matters.)
Line 9: Line 9:
I believe we can get the information we need without transmitting any information about the certificate we receive, so this should be anonymous, breaking users down into 4 buckets:
I believe we can get the information we need without transmitting any information about the certificate we receive, so this should be anonymous, breaking users down into 4 buckets:


# Users who are behind a MITM proxy using SHA-1 with a built-in root
# Users who are behind a MITM proxy using SHA-1 with an imported root
# Users who are behind a MITM proxy using SHA-1 with an imported root
# Users who are behind a MITM proxy using SHA-1 with a built-in root
# Users who are behind a MITM proxy not using SHA-1
# Users who are behind a MITM proxy not using SHA-1
# Users who are not behind a MITM proxy
# Users who are not behind a MITM proxy
122

edits

Navigation menu