logo

New Response

« Return to the blog entry

You are replying to:

  1. Depends. If the packets were directed to clients.rockalldesign.com then yes I say you're good to go. If the packets were directed at your IP address then that could well have been the initial handshake and setup. Your ID wouldn't have been sent at that point since it was still negiotiating the level of SSL, shared keys etc.

    If the packets weren't aimed at port 995 then it could well look "garbled" due to compression. In which case you *should* be worried. Decompress and Mr Black Hat is having a field day. :)

    Either way, man-in-the-middle attacks are very few and far between. The highest level of incidence of these I see are at internet cafe's and public hotspots. I serioulsy doubt your local provider is going to be worried enough to go about snooping your packets.

    Unless the Government thinks you have something to hide. O_o

Your Comments

Name:
E-mail:
(optional)
Website:
(optional)
Comment: