26 Mar
2015
26 Mar
'15
6:51 p.m.
On 27 Mar 2015, at 5:38, Mike wrote:
How is this possible? Can anyone comment on these devices and tell me what might be going on here?
It's been compromised and its being used for MITM? Or has some sort of TLS inspection capability built in which is essentially MITM, and which is enabled? Or some kind of content filtering capability which amounts to the same thing? ----------------------------------- Roland Dobbins <rdobbins@arbor.net>