Hacker News new | past | comments | ask | show | jobs | submit login

Anyone up for decoding the cert used by GoGo Inflight WiFi Service?

https://www.techdirt.com/articles/20150105/09344429597/gogo-...




This is not likely to be possible. Rob Graham was able to do it for Superfish because the SSL interceptor resides on the same machine as the browser, meaning that the private key is accessible to anyone who installs Superfish.

By contrast, the GoGo interceptor is going to be a computer somewhere either on the plane or possibly on the ground (at some GoGo data center), meaning that its private key isn't accessible unless you can somehow gain access to the interceptor system.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: