1 pointby mennylevinski13 hours ago2 comments
  • thitamian hour ago
    The structured audit report output is the most useful part for teams — raw diagnostic output is fine for individuals but useless in a compliance or incident review context without formatting. Curious about the threat model here: is this designed for self-diagnostics by end users, or for IT teams auditing multiple endpoints? The GUI suggests the former, but the network detection features feel more like the latter. Knowing which one would help frame what the tool is actually optimising for.
  • sensarts9 hours ago
    Is this inspecting certificates in real-time or analyzing stored traffic? And does it flag things like expired certs, weak ciphers, or pinned certificates that failed validation?