jefmcg
Guru
Ah, technically they are initialisations.An award for cramming a large number of impenetrable abbreviations into one post.
Ah, technically they are initialisations.An award for cramming a large number of impenetrable abbreviations into one post.
Some (me included) would say they're not acronyms as the initials don't make a word. Scuba is an acronym, as is NATO. DNS isn't a word, so isn't an acronym .TLAs not abbreviations
Domain Name Service
Internet Protocol
Universal Resource Location
Transport Control Protocol
Secure Sockets Layer
HyperText Transfer Protocol
Any errors, I blame intellitext/autocorrect.
Oh and Three Letter Acronym.
Some (me included) would say they're not acronyms as the initials don't make a word. Scuba is an acronym, as is NATO. DNS isn't a word, so isn't an acronym .
Ah, technically they are initialisations.
An award for cramming a large number of impenetrable abbreviations into one post.
SSL is point to point, not end to end, but it does make confidential the content of your interactions with a website from your ISP.
Well for a title that is VPN's ?. Seems a perfect fit.
One end iis your computer (the client) the other end is the website (the server). There are many points between the client and server, including isp servers, Internet backbone servers, routers, switches , etc etc. But the connection is fully encrypted from one end (the client) to the other end (the server). It certainly does not go from point to point being decrypted then re-encrypted. It is end to end between client and server.
You’re thinking too simply, transactionally, client-server. Browsing is more complex than that. A single html page on a single physical server serving nothing but resources in its own domain, accessed directly is a rare these days. It’s useful hypothetically, but in reality you can forget it.
I’m not saying you’re wrong, it’s a clear technical explanation.
Anyhoo, kids are in bed I can relax now, work tomorrow
In fact it does matter, because it is not necessarily internal, no it won’t generate a different connection if it’s masked in an api feed or iframe, and you’re describing point to point, not end to end.LOL I was mot thinking that simply. Just keeping my descriptions relevant to the context described. If you have an uninterrupted encrypted connection between two parties than you can consider it end to end. How the data is treated internally by one of the two parties does affect that status, nor does a web page requiring resources from other domains impact that. The latter will in fact generate an entirely different connection from the browser to the other domain.
Well, you can read their privacy policy - that's the best way to see what logs they may keep. As for hiding, I don't agree with that term. People want privacy, they deserve privacy and it is the unlawful and immoral big businesses that are plundering the privacy of many and therefore necessitating the use of VPNs and the like.As always, I will just put a few principles out there:
What makes you think any of these companies offer privacy, confidentiality or secrecy?
What activity do you want to hide, that you want these companies to know?
Even Cisco.
In fact it does matter, because it is not necessarily internal, no it won’t generate a different connection if it’s masked in an api feed or iframe, and you’re describing point to point, not end to end.
But it’s bedtime! Let’s save it.
SSL can act as end to end encryption where it terminates at the servers of the two parties involved.