From 113e6e9339f2331242c5b40da99aa2da6728d951 Mon Sep 17 00:00:00 2001
From: forest
Date: Sat, 30 Jan 2021 22:22:32 -0600
Subject: [PATCH] link to
https://en.wikipedia.org/wiki/Man-in-the-middle_attack
---
capsulflask/templates/about-ssh.html | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/capsulflask/templates/about-ssh.html b/capsulflask/templates/about-ssh.html
index 947e18c..d75a76c 100644
--- a/capsulflask/templates/about-ssh.html
+++ b/capsulflask/templates/about-ssh.html
@@ -77,7 +77,7 @@
And again, computer E in the middle can intercept the message, and they can decrypt it as well
because they have private key E.
Finally, they can relay the same message to computer A, this time encrypted with computer A's public key.
- This is called a Man In The Middle (MITM) attack.
+ This is called a Man In The Middle (MITM) attack.
Without some additional verification method,