This commit is contained in:
parent
d85ebd9042
commit
113e6e9339
@ -77,7 +77,7 @@
|
|||||||
And again, <b>computer E</b> in the middle can intercept the message, and they can decrypt it as well
|
And again, <b>computer E</b> in the middle can intercept the message, and they can decrypt it as well
|
||||||
because they have <b>private key E</b>.
|
because they have <b>private key E</b>.
|
||||||
Finally, they can relay the same message to <b>computer A</b>, this time encrypted with <b>computer A</b>'s public key.
|
Finally, they can relay the same message to <b>computer A</b>, this time encrypted with <b>computer A</b>'s public key.
|
||||||
This is called a <b>Man In The Middle (MITM)</b> attack.
|
This is called a <a href="https://en.wikipedia.org/wiki/Man-in-the-middle_attack">Man In The Middle (MITM)</a> attack.
|
||||||
</p>
|
</p>
|
||||||
<p>
|
<p>
|
||||||
Without some additional verification method,
|
Without some additional verification method,
|
||||||
|
Loading…
Reference in New Issue
Block a user