On Fri, Aug 22, 2014 at 07:13:54PM -0700, Bernard Aboba wrote: > The first assertion, is likely to > be proven false by the first gear to include built-in > man-in-the-middle attack support. Care to wager which appears > first, carrier-class gear supporting man-in-the-middle attacks, or > significant deployment of "opportunistic" encryption? This assumes that the telecom carriers and/or the suppliers of the carrier grade equipment would cooperate with the nation-states in question. That could happen, certainly, but it becomes much more difficult to do this surreptitiously. This won't help in a totalitarian regime, certainly, but in democratic societies having law enforcement agencies engaging in mass, surreptitious surveilance might be less likely to be tolerated. Cheers, - Ted