Umesh Bywar wrote:
> [...] my goal is a little different. I want to intercept requests from
> different clients (and not just the mozilla browser). So this compnent is
> a real proxy listening on some port for requests.

How do you plan to defeat the MITM detection in the products you intend
to attack?  Do you plan to plant a bogus root CA cert in them?
If so, how do you plan to get that CA cert into those products?

-- 
Nelson B

_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to