Comment on Could someone explain the networking behind transparent proxies and MiTM snooping using certificates to me?

<- View Parent
MigratingtoLemmy@lemmy.world ⁨11⁩ ⁨months⁩ ago

Thanks, I didn’t realise that certificate pinning was this strict.

This effort is to check if my mobile has a baseband processor that might be communicating with the internet. I want to know if my device has a backdoor in hardware. The idea with a VPN has me intrigued, could you tell me more about that?

source
Sort:hotnewtop