Compromising the consumer Laptop or computer, like by installing a malicious root certificate to the program or browser have faith in retailer. HTTP operates at the best layer in the TCP/IP design—the appliance layer; as does the TLS protection protocol (working to be a decrease sublayer of exactly the same http://XXX