On Tue, Jun 26, 2012 at 10:19 PM, Paul Wilkins <span dir="ltr"><<a href="mailto:paulwilkins369@gmail.com" target="_blank">paulwilkins369@gmail.com</a>></span> wrote:<br><div class="gmail_quote"><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
What has surprised me is that they need to hit the destination web server from the US. If this data had been replicated from the Telstra proxy servers and then transferred to the US by some back channel, there'd be zero visibility.<span class="HOEnZb"><font color="#888888"><br>
</font></span></blockquote><div><br>And if Telstra had written this system for themselves, that might be what it would do. However, forwarding the actual content back to another company has far
more serious implications than just sending a URL without any included
cookies/arguments/etc. Using the specifically returned content means that it's based on the contents of those cookies/login sessions/etc, and thus can and will contact personal information that will (normally) not be included if only the bare URL is used.<br>
<br>The simple fact is that what they are doing is common amongst multiple web security products. Cisco Ironport, Blue Coat, Websense, Zscaler, and most likely several others all have similar functionality. I'm sure countless ISPs in Australia are already passing similar feedback for email messages, and I'd be amazed if Telstra were the only ones doing it for web URLs...<br>
<br> Scott.<br><br><br></div></div>