Skip to main content

You are not logged in. Your edit will be placed in a queue until it is peer reviewed.

We welcome edits that make the post easier to understand and more valuable for readers. Because community members review edits, please try to make the post substantially better than how you found it, for example, by fixing grammar or adding additional resources and hyperlinks.

1
  • A proxy is one of several way to break a secure HTTP connection. Of course this also requires the use of a self-signed certificate in order to have a browser indicate the connection is still secure. The only end to end encryption is between the proxy and the website. This means regardless if the connection between the user and the proxy was encrypted, a user with complete and total control over the proxy, could in theory intercept the data. In order to decrypt the data, that of course would require, the proxy to use a self-signed certificate and for the browser to trust that certificate
    – Ramhound
    Commented Aug 5, 2020 at 22:44