Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

Secure proxy

Name: Anonymous 2008-06-24 13:07

If one (A) connects through a secure proxy (B), beit webbased or not, and you connect through that proxy to another secure website (C), is it possible for B to listen to and decipher the networktraffic?

Name: Anonymous 2008-07-03 18:45

>>9

True, but B can spoof identical certificates and have both parties sign, can it not?

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List