So using RC4 in TLS/SSL is cryptographically suspicious and legally troubled. What else do you need to disable it on your servers?
It DOES make you more secure. Not every attacker is capable of planting MITM attack, and current CA infrastructure works just fine against passive eavesdropping. Some security is better then no security at all.
Also, every time you write an article based on Snowden leaks, god kills a kitten.
Why the same logic do not apply for every router on the way?
Somebody MUST think about children!
False positives' possibility is still ignored. Let's just grab everyone and think about children.
I honestly believe being another DigiNotar event victim is a few orders of magnitude less likely then having some script kiddie hack my account.
How come I should care about legality of given software in any given country? Do you really propose to put yourself under chinese or madagascarian software patent, copyright and hacking laws?
No they can't. HTTPS inspection works only if user installed "trusted" certificate on his computer. This can be done in corporate environment, but not for home users.
How exactly can they plan to go deeper: go down and then dig?
World coming to its end!
In year 2010 we have automatic certificate distribution facilities in enterprise systems.
There is no trace of commits to linux filesystems, but article about Microsoft claims NTFS was updated.