Man in the Middle4:13 with Greg Stromire
When you talk to your friend on the phone or meet up with a coworker, you can recognize their voice or face. But computers aren’t that smart. Someone else could pretend to be Gmail, for example, and trick you (and your computer) into thinking you’re just logging into your email. They could even claim to be you to your contacts.
- Man in the Middle -- An attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.
- HTTPS -- The secure version of HTTP, or HyperText Transfer Protocol. Allows traffic to be encrypted and authenticated, protecting privacy and can help prevent man in the middle attacks.
- VPN -- Virtual Private Network, a way to redirect your internet traffic through an encrypted service for privacy and security. You can create your own though it may be simpler to a pay for commercial option.
You need to sign up for Treehouse in order to download course files.Sign up