losttourist@kbin.socialtoSelfhosted@lemmy.world•Could someone explain the networking behind transparent proxies and MiTM snooping using certificates to me?
2·
1 year agoYes, I think that ‘masquerading’ is the key bit to grasp. The MITM Proxy isn’t just intercepting the traffic, it alters the traffic as it passes through.
It’s half as much again! If your budget is that flexible you really should have mentioned it in the original post so that people could give you a wider range of options.
Translate it up by a couple of orders of magnitude and you get “I want to buy a car, I have €10,000 to spend” … “I found one for €15,000, it’s a little bit more but …”