Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Of course this is true, but the OP's screenshot is a Fiddler screenshot. It's safe to say the calls in question do use the proxy configuration.

For completeness, I ran Wireshark and didn't see any outbound HTTP (or otherwise abnormal) traffic while searching from the Start menu.



Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: