Compromising the client Laptop or computer, for example by installing a destructive root certification in the process or browser rely on retail store. SSL/TLS is particularly suited to HTTP, since it can offer some defense regardless of whether only one facet of your communication is authenticated. This can be the http://XXX