If I understand correctly, SSL traffic would still be encrypted even
through an ATS forward proxy located on the public internet. It would not
make sense for the ATS to decrypt the SSL traffic and forward plain
traffic, although I suppose you can configure it that way.


On Mon, Aug 25, 2014 at 6:13 PM, Adam W. Dace <[email protected]>
wrote:

> For a long time I've been running either a local ATS proxy, or a
> child/parent combination for my web browsing and it has me wondering.
>
> I'm pretty sure the connection between browser and ATS when using SSL is
> unencrypted.
> But does that matter?  If I have my facts right the encryption going on
> for SSL is simply between the browser itself and the remote origin website,
> with ATS acting as a pass-through.
>
> To put my question simply...if I switched from a local ATS forward proxy
> to one located on the public Internet would I be putting myself at risk
> when using SSL?  I'd hate to think my SSL traffic would be vulnerable to
> any sort of snooping.
>
> Thanks In Advance.
>
> Regards,
>
> Adam
>
> --
> ____________________________________________________________
> Adam W. Dace <[email protected]>
>
> Phone: (815) 355-7285
> Instant Messenger: AIM & Yahoo! IM - colonelforbin74 | ICQ - #39374451
> Microsoft Messenger - [email protected] <[email protected]>
>
> Google Profile: https://plus.google.com/u/0/109309036874332290399/about
>

Reply via email to