Hacker News new | past | comments | ask | show | jobs | submit login

"Breaks" as in "app is secure when faced by hostile actors"



I'm talking about secure networks, where all traffic has to be monitored to ensure nothing is accidentally leaked, that malware doesn't easily spread, or that proxies aren't used to circumvent filtering. MITM devices configured by the user are very much friendly actors, and an important component of defense in depth.

To be clear, the way these normally work is that they have their own root CA that devices participating on the network add to their trust stores voluntarily.




Consider applying for YC's Summer 2025 batch! Applications are open till May 13

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: