Say Alice wants to open up an HTTPS connection to Bob through a proxy named Earl.

What prevents Earl from reading alices request, opening a connection pretending to be bob, and then opening a https connection with bob pretending to be Alice , and snooping on the traffic as it passes through ?

  • RonSijm
    link
    fedilink
    arrow-up
    1
    ·
    1 year ago

    I refuse to browse the web on company hardware.

    There are tools that you can use to scan whether there are no root certificates (from your company) are injected into your certificate store, if that’s what you’re concerned about.

    But yea, even if I get company hardware, I still just do a clean OS install