Hey Stephen,
This would only be a breaking change for end-users with incorrectly configured machines. Customers that are not MITM connections would not see any problems. And customers that *are* MITM connections, but they also properly register their new "Certificate Authority" on the machines, then they won't see any problems.
The only cases where you would see problems in the new version of TurboActivate are 2 cases:
1. The customer is MITM connections, but has not properly added their "CA" (Certifcate Authority) to the machines they MITM.
2. The customer is MITM connections, *has* correctly added their CA to the machines, but they're also inserting extra junk into the request to the LimeLM servers or the responses from the LimeLM servers.
In case 2 that would fail even in the old version of TurboActivate. Case 1 is a simple fix for end-users. They should be doing it anyway -- that is, if they're MITM all connections from their employees they should be setting up their CA on the machine. If they're not doing that then that implies they disabled TLS checking altogether (which means *anyone* can MITM connections from their corporation). That is a huge security problem for that customer.
Long story short: you won't see any problems with the majority of customers. Occasionally you will see an end-user doing something unbelievably stupid (like disabling TLS verification), but those are outliers, and they should be notified of their problem so they can fix it rather than wallow in ignorance of the security vulnerabilities they opened their corporation up to.