Privacy & Foss advocate, and Linux user.
Ace 🖤🩶🤍💜

Anti Commercial-AI license (CC BY-NC-SA 4.0)

  • 0 Posts
  • 34 Comments
Joined 1 year ago
cake
Cake day: June 14th, 2023

help-circle




  • By combining with other methods for intercepting HTTPS traffic, typically involving installing certificates or modifying system configurations like configuring your browser or operating system to log secret keys.

    To break down the process of the cert method :

    • Device Trust: Install a trusted Root CA certificate (issued by you) on the Android device using Root permissions. This certificate tricks apps into trusting the proxy. Without Root level install the apps may reject the certificate as User Installed.
    • Device Routes Traffic : Configure the rooted Android device to route its traffic to the proxy on the separate system. This can be done through proxy settings.
    • Proxy Decryption : Configure the proxy to use the corresponding private key to decrypt the HTTPS traffic coming from your device, this key is generated when you created/issued the Root CA.
    • Traffic Inspection : With the traffic decrypted, you can use Wireshark configured to the proxy to inspect the traffic.
    • Proxy Re-encrypts and Forwards: After inspection, the proxy re-encrypts the traffic using a legitimate certificate and forwards it to the real website.











  • Not all instances keep logs…
    Some intentionally discard them, look into the policys of the instance you’re signing up to.
    All your comments and posts are hosted on your parent instance then shared to the federated instances.
    Some instances don’t even let you sign up with an email or make it optional.
    Lemmy.world keeps logs, but much more controversial instances often don’t.
    Also it’s much more complex, because you have to think about the scope of the potential lawsuit as well as the given evidence that a user is actually sharing the material infringing on their copyright; which will not be a large amount of the user base. They can’t simply sue a user for having an account, the user has to actively be sharing infringing material.