Web servers can detect when their HTTPS connections are intercepted, and that means you can measure interception. https://zakird.com/papers/https_interception.pdf …
-
-
If it can be done reliably, seems like a no-brainer that sites should block all access if they detect MITM.
-
And invalidate any login credentials that were sent over the MITM'd connection (e.g. passwords).
End of conversation
New conversation -
-
-
lazy masquerading as client's browser in the interception software (ssl fingerprint/timing/header mismatches)
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.