Reply to post:

Apple blocks comms-snooping malware

Anonymous Coward
Anonymous Coward

Usually such systems need a custom CA installed on the end systems, or it won't be able to create valid certificate on the fly. Encryption is *always* useless unless you can verify fully the other end point.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon