Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I have no problem with that: if my workplace MITMs traffic, I’ll use my cellphone connection and a personal laptop for sensitive data. If a friend’s house mitms traffic, same deal.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: