Compromising the consumer Computer system, which include by installing a malicious root certificate in the procedure or browser trust shop. HTTPS is currently the popular protocol for all activity on the net, as it's the safest way for people to protect delicate information. Even though HTTP/2 won't demand using encryption http://XXX