How to Stop Man in the Middle Attacks Part 3

You may have heard of something called a “trusted third party” before while using a web browser. This is usually used in reference to security certificates. This might seem confusing at first but it’s actually very simple.

The situation:
Alice and Bob have come up with a nearly fool proof way to stop people from eavesdropping on them. The last thing they need to do is get Alice’s public key to Bob through Mallory without Mallory modifying the key or replacing it.

To do this they use Trent. Trent has started his own business of securely transmitting public keys for people.

The idea is that everyone already has Trent’s public key. Alice simply needs to securely send her public key over to Trent and he’ll sign it with his public key and send it out to anyone who asks for it. This way Bob doesn’t need to have Alice’s public key ahead of time just to be able to create an encrypted connection with her.

1,747 thoughts on “How to Stop Man in the Middle Attacks Part 3

  1. Wow, fantastic weblog structure! How lengthy have yyou ever been running a blog for? you make running a blog glance easy. The overall look of your web sire is excellent, let alone the content material!

  2. Your articles are always very informative and useful for all bloggers..I always learn many thing from your articles..Thanks in tons.

  3. Do you mind if I quote a couple of your posts as long as I provide credit and sources back to your blog? My blog is in the same niche as yours, and my users would benefit from some of the information you provide here. Please let me know if this ok with you. Thank you.

  4. Do you mind if I quote a couple of your posts as long as I provide credit and sources back to your blog? My blog is in the same niche as yours, and my users would benefit from some of the information you provide here. Please let me know if this ok with you. Thank you.

  5. It’s a great pleasure reading your post. I am amazed by the way you have explained things in this article. Thank you share this great Post.

  6. Hello! Someone in my Facebook group shared this website with us, so I came to give it a look. I’m enjoying the information. I’m bookmarking and will be tweeting this to my followers! Wonderful blog and amazing design and style.

  7. I really love the theme/design of your website. Do you ever run into any browser compatibility problems? A small number of my blog audience have complained about my site not working correctly in Explorer but looks great in Safari.

  8. I’d love to be a part of group where I can get advice from other experienced people that share the same interest. If you have any recommendations, please let me know. Thank you.

  9. And indeed, I’m just always astounded concerning the remarkable things served by you. Some four facts on this page are undeniably the most effective I’ve had.

  10. Appreciation for really being thoughtful and also for deciding on certain marvelous guides most people really want to be aware of.

  11. Hello, there. I know this is off-topic, but I was wondering which blog platform are you using for this site? I’m getting fed up of WordPress because I’ve had problems with hackers and I’m looking at options for another platform. I would be fantastic if you could point me in the direction of a good platform.

  12. Thanks for one marvelous posting! I enjoyed reading it; you are a great author.I will make sure to bookmark your blog and may come back someday. I want to encourage that you continue your great posts, have a nice weekend!

  13. Your very own commitment to getting the message throughout came to be rather powerful and have consistently enabled employees just like me to arrive at their desired goals.

  14. Thanks to the article you shared that my problem has been solved, the way you share it is great, thank you for sharing this meaningful article.

Leave a Reply

Your email address will not be published. Required fields are marked *

6 + 8 =