a reverse proxy with end-to-end encryption https://engineering.example.com/37371 0 points by gus | 9 months ago Curious what others think about this approach. We've been using it in production for 6 months.