quote:
Originally posted by Gear.Up:
Would you agree that it's possible to decrypt traffic via proxy server, inline method, etc.?
Sure. It's called a "Man In The Middle" attack. But it takes more than just installing a "corporate certificate" on client machines.
I don't mean to be insulting or dismissive, but an explanation of how public/private key cryptography works would take
way more effort than I'm willing to expend

There are plenty of on-line resources, however.
"America is at that awkward stage. It's too late to work within the system,,,, but too early to shoot the bastards." -- Claire Wolfe
"If we let things terrify us, life will not be worth living." -- Seneca the Younger, Roman Stoic philosopher