Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

You can decode TLS traffic with a little bit of effort, tho you have to control the endpoints which makes it a bit moot as if you control them you can just... enable query logging
 help



True, but logging tells you what happened, a proxy lets you decide what's allowed to happen before it hits the database. Policy enforcement, tenant isolation, that kind of thing. They're complementary really.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: