Do these hacking techniques rely on the browser running on a Windows machine, or do they work on any OS?
So--this is real for all OSes that use TLS 1.0 encryption.