. . . "We have explained the chain of trust before in varying levels of detail, but the concept is straightforward for securing traffic such as web browsing:" .