Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The blog mentions they used Charles to intercept traffic and reverse engineer the digital lock [0]. How does a tool like that decode HTTPS traffic? I thought HTTPS was encrypted end to end by the browser.

[0] https://www.charlesproxy.com/



You add its root cert, and it re-encrypts: https://www.charlesproxy.com/documentation/proxying/ssl-prox...




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: