Answer the question
In order to leave comments, you need to log in
Filtering HTTPS traffic without disclosing crypto keys - is it possible?
A notorious ddos protection company offers a service such as filtering HTTPS traffic without revealing crypto keys. No details, it is only written that this is a "unique" technology. So, is this really some kind of their development or just a marketing ploy?
Answer the question
In order to leave comments, you need to log in
marketing. realtime https does not break. Only a couple of weeks ago I was at the Tsiska conference - they clearly spoke it.
Is not a fact. Depends on what is meant.
For example, here is a recent article on Habré: habrahabr.ru/company/billing/blog/261301/?utm_camp...
Most likely, they interact at the Proxy level with your company and can initiate connections instead of you. You are already being passed the output of the request. This means that they will initially have the keys and they can open https.
Well, they can terminate HTTPS on themselves and then send you at least HTTPS, at least HTTP
, let’s say CloudFlare has it when they add your domain to their certificates
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question