From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from ip-64-139-1-69.sjc.megapath.net (ip-64-139-1-69.sjc.megapath.net [64.139.1.69]) by huchra.bufferbloat.net (Postfix) with ESMTP id 06CA621F374 for ; Tue, 6 Jan 2015 12:45:31 -0800 (PST) Received: from shuksan (localhost [127.0.0.1]) by ip-64-139-1-69.sjc.megapath.net (Postfix) with ESMTP id 8FAE240600C; Tue, 6 Jan 2015 12:45:28 -0800 (PST) X-Mailer: exmh version 2.7.2 01/07/2005 with nmh-1.3 To: bloat@lists.bufferbloat.net From: Hal Murray Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Date: Tue, 06 Jan 2015 12:45:28 -0800 Message-Id: <20150106204528.8FAE240600C@ip-64-139-1-69.sjc.megapath.net> Cc: Hal Murray Subject: [Bloat] Bufferbloat: GoGo blocking YouTube X-BeenThere: bloat@lists.bufferbloat.net X-Mailman-Version: 2.1.13 Precedence: list List-Id: General list for discussing Bufferbloat List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 06 Jan 2015 20:46:00 -0000 David P. Reed: GoGo does not need to run "Man in the Middle Attacks" on YouTube http://www.reed.com/blog-dpr/?p=174 Whick summary: GoGo provides internet access on airplanes. They want to block YouTube (and similar) to avoid overloading their thin pipes. They are doing that by intercepting https connections and presenting bogus certificates. Details here: Gogo issues fake HTTPS certificate to users visiting YouTube Inflight service promises no data is collected, but practice sets a bad precedent http://arstechnica.com/security/2015/01/gogo-issues-fake-https-certificate-to- users-visiting-youtube/ -- These are my opinions. I hate spam.