“How to take over the computer of any Java (or Clojure or Scala) developer
Unless you take very careful steps that involve paying someone $10, JARs you download can be man-in-the-middled, and code you execute on your system can be replaced by malware.
When can this happen? If you ever use a public wifi network in a coffee shop, or are on a wifi network that someone took over you can be man-in-the-middled. Your ISP can man-in-the-middle you at will, and some do so in order to serve you ads. Or, perhaps you are subject to a man-in-the-middle attack from a state actor.”
▻http://blog.ontoillogical.com/blog/2014/07/28/how-to-take-over-any-java-developer
#Java #computer_security #TLS (or lack of)