From 113e6e9339f2331242c5b40da99aa2da6728d951 Mon Sep 17 00:00:00 2001 From: forest Date: Sat, 30 Jan 2021 22:22:32 -0600 Subject: [PATCH] link to https://en.wikipedia.org/wiki/Man-in-the-middle_attack --- capsulflask/templates/about-ssh.html | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/capsulflask/templates/about-ssh.html b/capsulflask/templates/about-ssh.html index 947e18c..d75a76c 100644 --- a/capsulflask/templates/about-ssh.html +++ b/capsulflask/templates/about-ssh.html @@ -77,7 +77,7 @@ And again, computer E in the middle can intercept the message, and they can decrypt it as well because they have private key E. Finally, they can relay the same message to computer A, this time encrypted with computer A's public key. - This is called a Man In The Middle (MITM) attack. + This is called a Man In The Middle (MITM) attack.

Without some additional verification method,