Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

Secure proxy

Name: Anonymous 2008-06-24 13:07

If one (A) connects through a secure proxy (B), beit webbased or not, and you connect through that proxy to another secure website (C), is it possible for B to listen to and decipher the networktraffic?

Name: Anonymous 2008-07-05 5:24

>>15

But, but, but, well, okay.  I guess if you have people who don't know anything about what they're doing it's possible to mount MITM attacks, especially when you can buy certificates for like $25 nowadays.

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List