I’ve been reading this about Cloudflare and realized they require any site using their services to install their certificate to then proceed to fully sniff and analyze, and sometimes even modify https traffic. This is something I didn’t realize before. Here are the relevant screenshots:
TLS isn’t really related to E2EE. E2EE data can be delivered securely over http without any transport encryption, as long as the secrets/passwords/keys themselves never leave the client unencrypted (the data is encrypted by the client before transport).
A cloudflare hosted/protected site can still provide E2EE. You just have to trust that they aren’t going to conduct any sophisticated transport attacks to inject malicious code and surreptitiously obtain your secrets.
IMO it is. Is it not a solution which prevents everybody but the client’s browser and the web-server from taking part in the communication? Why?
On top of HTTP? Nice. Is there a RFC or a framework which implements such a solution?