Compromising the customer Laptop, for example by putting in a malicious root certificate into your process or browser rely on keep. HTTPS is now the preferred protocol for all activity online, as it's the safest way for users to shield delicate data. This means that an attacker that correctly spoofs http://XXX