• asdfasdfasdf@lemmy.world
    link
    fedilink
    English
    arrow-up
    19
    arrow-down
    2
    ·
    edit-2
    4 hours ago

    How is DPI a problem if it’s encrypted? That would only work if the attacker had installed their CA cert on your client machine, right?

    • henfredemars@infosec.pub
      link
      fedilink
      English
      arrow-up
      16
      ·
      4 hours ago

      I’m doing DPI on my own network and I can still view TLS certificate fingerprints and some metadata that provides a good educated guess as to what a traffic flow contains. It certainly better that it’s encrypted, but there is a little information that leaks in metadata. I think that’s what was meant.

      • catloaf@lemm.ee
        link
        fedilink
        English
        arrow-up
        10
        ·
        edit-2
        2 hours ago

        True, but this is generally not useful information to anyone. They can see you’re visiting bank.com, but they still can’t see your bank details.

        It might be useful if they’re trying to target you for phishing, but a targeted attack is extremely unlikely.

        Also, any wireless equipment from the past 15 years or so supports client isolation.

    • orange@communick.news
      link
      fedilink
      English
      arrow-up
      12
      ·
      edit-2
      4 hours ago

      I think it might be confusion between inspecting plaintext metadata like SNI vs actually inspecting encrypted contents (e.g. HTTPS content, headers, etc.).