Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Of course this is true, but the OP's screenshot is a Fiddler screenshot. It's safe to say the calls in question do use the proxy configuration.

For completeness, I ran Wireshark and didn't see any outbound HTTP (or otherwise abnormal) traffic while searching from the Start menu.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: