diff --git a/capsulflask/templates/about-ssh.html b/capsulflask/templates/about-ssh.html index 947e18c..d75a76c 100644 --- a/capsulflask/templates/about-ssh.html +++ b/capsulflask/templates/about-ssh.html @@ -77,7 +77,7 @@ And again, computer E in the middle can intercept the message, and they can decrypt it as well because they have private key E. Finally, they can relay the same message to computer A, this time encrypted with computer A's public key. - This is called a Man In The Middle (MITM) attack. + This is called a Man In The Middle (MITM) attack.

Without some additional verification method,