forest 2021-01-30 22:22:32 -06:00
parent d85ebd9042
commit 113e6e9339

View File

@ -77,7 +77,7 @@
And again, <b>computer E</b> in the middle can intercept the message, and they can decrypt it as well
because they have <b>private key E</b>.
Finally, they can relay the same message to <b>computer A</b>, this time encrypted with <b>computer A</b>'s public key.
This is called a <b>Man In The Middle (MITM)</b> attack.
This is called a <a href="https://en.wikipedia.org/wiki/Man-in-the-middle_attack">Man In The Middle (MITM)</a> attack.
</p>
<p>
Without some additional verification method,