Zero Knowledge cover image

zkTLS with Maddy from Reclaim

Zero Knowledge

00:00

Exploring Proxy Vulnerabilities and Network Attacks

This chapter examines the various vulnerabilities that proxies may face, including DNS compromise and BGP hijacking. It explains the methods attackers could use to exploit these weaknesses while also acknowledging the challenges and limitations in executing such attacks.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app