Comment on Could someone explain the networking behind transparent proxies and MiTM snooping using certificates to me?

<- View Parent
MigratingtoLemmy@lemmy.world ⁨11⁩ ⁨months⁩ ago

I understand. What other methods would you suggest to be able to snoop on/decrypt the traffic from my device?

source
Sort:hotnewtop