Compromising the customer Computer system, for instance by installing a destructive root certification in to the process or browser believe in keep. In the transit between the browser and the web server, HTTPS guards the information from staying accessed and altered by hackers. Whether or not the transmission is intercepted, http://XXX