technically apt people ... are beginning to understand just what an internet stream hijack implies
Well, I guess that excludes me. I didn't follow how they went from hijacking my browser session to getting my whole TCP stream. Could you explain?
Or did you mean that Phorm's servers intercept everything coming across my connection, and that the browser scenario was just one example?