Umesh Bywar wrote: > [...] my goal is a little different. I want to intercept requests from > different clients (and not just the mozilla browser). So this compnent is > a real proxy listening on some port for requests.
How do you plan to defeat the MITM detection in the products you intend to attack? Do you plan to plant a bogus root CA cert in them? If so, how do you plan to get that CA cert into those products? -- Nelson B _______________________________________________ dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto