Return
Styles:
Pseud0ch
,
Terminal
,
Valhalla
,
NES
,
Geocities
,
Blue Moon
.
Entire thread
Secure proxy
1
Name:
Anonymous
2008-06-24 13:07
If one (A) connects through a secure proxy (B), beit webbased or not, and you connect through that proxy to another secure website (C), is it possible for B to listen to and decipher the networktraffic?
12
Name:
Anonymous
2008-07-03 18:45
>>9
True, but B can spoof identical certificates and have both parties sign, can it not?
Newer Posts
Don't change these.
Name:
Email:
Entire Thread
Thread List