Gogo in-flight Wi-Fi is spoofing its own customers

Known as a man-in-the-middle attack, injecting malware into data from an otherwise innocuous site has become an increasingly common tactic and has led companies across the web to push for HTTPS encryption as the best way to stop the attacks in action. But that only works if users check the HTTPS certificates, and providers like Gogo don’t actively lie to them about who’s issuing the certificate for a given site. It’s a particularly hot topic for Gogo after reports that the company is cooperating with law enforcement far beyond its legal obligations. – Russell Brandom, The Verge
(Full Story: http://ift.tt/1ysG0tp )

One comment