Je hebt een klacht over de onderstaande posting:
Door cluc-cluc: Er blijkt namelijk uit https://community.qualys.com/blogs/securitylabs/2013/09/10/is-beast-still-a-threat: But one platform held back - Apple's. We know little about their intentions, because there hasn't been any official communication on this topic. My understanding is that the 1/n-1 split was incorporated in the Mountain Lion release, but that it is disabled by default. Also, as far as I am aware, the split is not in use on iOS either.In mijn artikel verwijs ik naar een follow-up post van Ivan Ristic, namelijk https://community.qualys.com/blogs/securitylabs/2013/10/31/apple-enabled-beast-mitigations-in-os-x-109-mavericks. Daaruit: Door Ivan Ristic op Oct 31, 2013 9:26:43 AM: Today, I was delighted to see that the code had been changed, and that the default setting had been changed from disabled to enabled, meaning that the SSL stack that ships with OS X 10.9 uses BEAST mitigations by default. To see for yourself, look for the first mention of defaultSplitDefaultValue in the source code. ...
Beschrijf je klacht (Optioneel):