Say Alice wants to open up an HTTPS connection to Bob through a proxy named Earl.

What prevents Earl from reading alices request, opening a connection pretending to be bob, and then opening a https connection with bob pretending to be Alice , and snooping on the traffic as it passes through ?

  • hascat
    link
    fedilink
    English
    arrow-up
    6
    ·
    1 year ago

    I refuse to browse the web on company hardware.

    This should be the default no matter the policy the company has in place. I wouldn’t trust an employer to not spy on my online activity.