forest 2021-01-30 22:22:32 -06:00
parent d85ebd9042
commit 113e6e9339

View File

@ -77,7 +77,7 @@
And again, <b>computer E</b> in the middle can intercept the message, and they can decrypt it as well And again, <b>computer E</b> in the middle can intercept the message, and they can decrypt it as well
because they have <b>private key E</b>. because they have <b>private key E</b>.
Finally, they can relay the same message to <b>computer A</b>, this time encrypted with <b>computer A</b>'s public key. Finally, they can relay the same message to <b>computer A</b>, this time encrypted with <b>computer A</b>'s public key.
This is called a <b>Man In The Middle (MITM)</b> attack. This is called a <a href="https://en.wikipedia.org/wiki/Man-in-the-middle_attack">Man In The Middle (MITM)</a> attack.
</p> </p>
<p> <p>
Without some additional verification method, Without some additional verification method,