|
|
@@ -66,7 +66,7 @@ packets (the answer!). |
|
|
|
I loaded the packet capture into wireshark, applied the SSL protocol |
|
|
|
analysis and confirmed that the client certificate was present in clear |
|
|
|
text: |
|
|
|
 |
|
|
|
[]({{ media_url('images/tls.packet.capture.screenshot.png') }}) |
|
|
|
|
|
|
|
So, there you have it. Do not use client authentication, pre-TLS 1.3, |
|
|
|
if you care about the privacy of your users. |
|
|
|