Comment on Could someone explain the networking behind transparent proxies and MiTM snooping using certificates to me?

<- View Parent
losttourist@kbin.social ⁨11⁩ ⁨months⁩ ago

Yes, I think that 'masquerading' is the key bit to grasp. The MITM Proxy isn't just intercepting the traffic, it alters the traffic as it passes through.

source
Sort:hotnewtop