This document describes how “http” URIs can be accessed using Transport Layer Security (TLS) to mitigate pervasive monitoring attacks.
Sign in to post comments.
Comments (0)
Sign in to post comments.