Re: question about basics of creating a PROXY to MONITOR network activity

2021-04-10 Thread cseb...@gmail.com
> Is it even possible to be secure in that way? This is, by definition, > a MITM, and in order to be useful, it *will* have to decrypt > everything. So if someone compromises the monitor, they get > everything. Chris I hear all your security concerns and I'm aware of them. I *really* don't

question about basics of creating a PROXY to MONITOR network activity

2021-04-08 Thread cseb...@gmail.com
I'm trying to create an application that stands in between all connections to a remote server to monitor behavior for security and compliance reasons. I'm guessing I'll have all users log into this middle man proxy application instead of logging into the original website? Are there any frameworks