User: Password:
|
|
Subscribe / Log in / New account

HTTPS interception in Nokia's mobile browser

HTTPS interception in Nokia's mobile browser

Posted Jan 29, 2013 17:21 UTC (Tue) by Cyberax (✭ supporter ✭, #52523)
In reply to: HTTPS interception in Nokia's mobile browser by nim-nim
Parent article: HTTPS interception in Nokia's mobile browser

>Please explain why. Because there is zip technical differences between
Then perhaps you should study networking? Nokia's browser (and Opera Mini) decompress traffic using specifically modified client. They do NOT need (or want) proxies on the provider level.

> Anyone who pretends he is able to secure thousands of endpoints (especially end-user endpoints where the user will actively work against any securing to get the latest shiny stuff) is a damn liar.
And anyone who presents an edge firewall as something except a window dressing is a fraudster.


(Log in to post comments)

HTTPS interception in Nokia's mobile browser

Posted Jan 29, 2013 18:42 UTC (Tue) by nim-nim (subscriber, #34454) [Link]

The 'specially modified client' just plugs into a proxy that compresses the traffic before hitting the air interface. As do all the spdy-capable proxies which are starting to hit the market. So what is your point exacly?


Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds