question about basics of creating a PROXY to MONITOR network activity
2QdxY4RzWzUUiLuE at potatochowder.com
2QdxY4RzWzUUiLuE at potatochowder.com
Thu Apr 8 10:41:15 EDT 2021
On 2021-04-09 at 00:17:59 +1000,
Chris Angelico <rosuav at gmail.com> wrote:
> Also, you'd better be really REALLY sure that your monitoring is
> legal, ethical, and not deceptive.
Not to mention *secure*. Your monitor increases the attack surface of
the system as a whole. If I break into your monitor, can I recover
passwords (yours, users, servers, etc.)? Can I snoop on traffic? Can I
snoop metadata (like when which users are talking to which servers) not
otherwise available on your network?
More information about the Python-list
mailing list