technically apt peopleWell, I guess that excludes me. I didn't follow how they went from hijacking my browser session to getting my whole TCP stream. Could you explain?
... are beginning to understand just what an internet stream hijack implies
Or did you mean that Phorm's servers intercept everything coming across my connection, and that the browser scenario was just one example?