Inspect HTTP(S) with your own man-in-the-middle non-attacks

Comments

Comments are closed.

Great overview of a very complicated subject. I liked the examples and thought the demos went pretty well given how challenging demos in a talk can be to pull of.