Why a malicious ISP/government would need to install certificate on users’ devices instead of any device in the middle of the data transit route? [duplicate]

Let’s say a country or ISP is malicious, forces citizens/users to install trusted root certificate on their devices so they can view all HTTPS traffic, but why is this even necessary? why can’t they just redirect all the traffic to a netwo… Continue reading Why a malicious ISP/government would need to install certificate on users’ devices instead of any device in the middle of the data transit route? [duplicate]

Can applications or websites know if their traffic is decrypted and re-encrypted by Fiddler? [duplicate]

Can websites, server-side apps such as those that rely on a constant connection with server e.g. messaging apps, server-side online games such as those that rely on constant server connection for player movement, inventory data etc. tell t… Continue reading Can applications or websites know if their traffic is decrypted and re-encrypted by Fiddler? [duplicate]

Comparing ACME client logs against Certificate Transparency logs

Inspired by this comment from Can DDNS provider perform a MITM attack?, I was wondering if there is an automated way to check the Certificate Transparency logs for malicious/unexpected certificates.
For example, if I run some ACME client o… Continue reading Comparing ACME client logs against Certificate Transparency logs