I'm a bit concerned about TeamViewer's protocol security. Before you get started, keep in mind this question is related to TV. I know there are other solutions like SSH, OpenVPN, LogMeIn, etc. but in this specific case the question is for TV only.
Having set that aside, my main concern is that even if the computer has a root CA (like the one Fiddler installs to sniff HTTPS traffic) -or- if you use Wireshark to grab TV's packets, is it possible to retrieve the screen information so you can see it, or is that encrypted somehow?
I know they use some kind of key sharing in the connection negotiation procedure, but I'm concerned also if with the root CA, a firewall or sniffer of some kind can get those keys and decrypt the data. I don't want/need a generic answer such as "Any MITM can sniff all packets so you're not secure" because that's not true. You can sniff them but if you can't decrypt them in any way then it's all good (at least for my question's objective).
Basically, I want to know that even if I'm running through a proxy/firewall/someone-else-using-a-sniffer-inside-the-proxy, the whole screen can't be seen either in realtime or by packet replay. Thanks in advance! :)
(Before you ask, I'm working on an app which works in a similar way, with master servers and all that, and I'd like to know if by using the same key exchange methods and data encryption is secure enough unless someone tries to break the protocol using a special app that mimicks the app server instead, which would take a lot of work and in the case of TV and my app, such app does not exist yet AFAIK).