logoalt Hacker News

PunchyHamsteryesterday at 10:46 AM1 replyview on HN

You can decode TLS traffic with a little bit of effort, tho you have to control the endpoints which makes it a bit moot as if you control them you can just... enable query logging


Replies

Sentinel-gateyesterday at 5:46 PM

True, but logging tells you what happened, a proxy lets you decide what's allowed to happen before it hits the database. Policy enforcement, tenant isolation, that kind of thing. They're complementary really.