Tagged articles
25 articles
Page 1 of 1
Linux Tech Enthusiast
Linux Tech Enthusiast
May 15, 2026 · Information Security

Why HTTPS Is Secure: From HTTP Vulnerabilities to TLS Handshake

The article explains HTTP’s plaintext nature and its susceptibility to man‑in‑the‑middle attacks, then details how HTTPS (TLS) uses asymmetric key exchange, certificates, and a trusted CA hierarchy to establish encrypted communication and prevent such attacks.

AESCACertificate
0 likes · 10 min read
Why HTTPS Is Secure: From HTTP Vulnerabilities to TLS Handshake
Linux Tech Enthusiast
Linux Tech Enthusiast
Feb 27, 2026 · Information Security

Why HTTPS Is Secure: From HTTP Vulnerabilities to TLS and CA Trust

HTTPS secures web communication by replacing plaintext HTTP with TLS encryption, using asymmetric key exchange to protect symmetric keys, and relying on a hierarchical CA certificate chain to verify server identities, thereby preventing man‑in‑the‑middle attacks that exploit HTTP’s unencrypted traffic.

AESCertificate AuthorityHTTPS
0 likes · 10 min read
Why HTTPS Is Secure: From HTTP Vulnerabilities to TLS and CA Trust
Python Programming Learning Circle
Python Programming Learning Circle
Sep 6, 2024 · Information Security

Understanding HTTP, HTTPS, and How to Prevent Man‑in‑the‑Middle Attacks

This article explains the fundamentals of the HTTP protocol, illustrates its vulnerability to man‑in‑the‑middle attacks, demonstrates why plain HTTP is insecure, and shows how HTTPS, TLS/SSL, asymmetric encryption, and certificate authorities together protect communications from interception and tampering.

Certificate AuthorityHTTPHTTPS
0 likes · 9 min read
Understanding HTTP, HTTPS, and How to Prevent Man‑in‑the‑Middle Attacks
Open Source Linux
Open Source Linux
Mar 3, 2023 · Information Security

Why HTTP Is Insecure and How HTTPS Stops Man-in-the-Middle Attacks

This article explains the fundamental weaknesses of HTTP, demonstrates how man‑in‑the‑middle attacks exploit clear‑text communication, and shows how HTTPS—through SSL/TLS handshakes, certificate validation, and CA hierarchies—protects web traffic from interception and tampering.

HTTPHTTPSMan-in-the-Middle
0 likes · 9 min read
Why HTTP Is Insecure and How HTTPS Stops Man-in-the-Middle Attacks
MaGe Linux Operations
MaGe Linux Operations
Feb 20, 2023 · Information Security

Why HTTP Is Insecure and How HTTPS Stops Man-in-the-Middle Attacks

This article explains the fundamentals of HTTP, demonstrates how its plaintext nature enables man‑in‑the‑middle attacks, explores symmetric and asymmetric encryption attempts to mitigate the risk, and shows how HTTPS—through TLS handshakes, certificate validation, and a trusted CA hierarchy—provides robust protection.

Certificate AuthorityHTTPHTTPS
0 likes · 10 min read
Why HTTP Is Insecure and How HTTPS Stops Man-in-the-Middle Attacks
Selected Java Interview Questions
Selected Java Interview Questions
Oct 13, 2021 · Information Security

Understanding HTTP and HTTPS: Protocol Basics, Man‑in‑the‑Middle Attacks, and Secure Communication

This article explains the fundamentals of the HTTP protocol, illustrates how plain‑text communication enables man‑in‑the‑middle attacks, and describes how symmetric and asymmetric encryption, SSL/TLS handshakes, and CA certificate chains are used in HTTPS to secure web traffic.

HTTPHTTPSMan-in-the-Middle
0 likes · 8 min read
Understanding HTTP and HTTPS: Protocol Basics, Man‑in‑the‑Middle Attacks, and Secure Communication
Programmer DD
Programmer DD
Apr 4, 2021 · Information Security

Why HTTP Is Insecure and How HTTPS Stops Man‑in‑the‑Middle Attacks

This article reviews the fundamentals of the HTTP protocol, explains why its plaintext transmission makes it vulnerable to man‑in‑the‑middle attacks, and details how HTTPS—through SSL/TLS, asymmetric key exchange, and CA certificate verification—protects data integrity and confidentiality.

Certificate AuthorityHTTPHTTPS
0 likes · 9 min read
Why HTTP Is Insecure and How HTTPS Stops Man‑in‑the‑Middle Attacks
Java Backend Technology
Java Backend Technology
Feb 28, 2021 · Information Security

Why HTTP Is Unsafe and How HTTPS Secures Your Data

This article examines the vulnerabilities of HTTP, illustrates man‑in‑the‑middle attacks, and explains how HTTPS—through SSL/TLS handshakes, certificate authorities, and asymmetric encryption—protects communications, providing a comprehensive understanding of web security fundamentals for developers and users alike.

Certificate AuthorityHTTPHTTPS
0 likes · 10 min read
Why HTTP Is Unsafe and How HTTPS Secures Your Data
Python Programming Learning Circle
Python Programming Learning Circle
Jan 12, 2021 · Information Security

Understanding HTTP, HTTPS, and How They Prevent Man‑in‑the‑Middle Attacks

The article explains the vulnerabilities of plain HTTP, demonstrates how man‑in‑the‑middle attacks can intercept and modify traffic, and describes the evolution of security mechanisms—including symmetric and asymmetric encryption, TLS handshakes, and certificate authority verification—that together make HTTPS a robust solution for protecting web communications.

Certificate AuthorityHTTPHTTPS
0 likes · 8 min read
Understanding HTTP, HTTPS, and How They Prevent Man‑in‑the‑Middle Attacks
Java Interview Crash Guide
Java Interview Crash Guide
Jan 1, 2021 · Information Security

How HTTPS Secures Your Web Traffic: Deep Dive into Protocols, Certificates, and Risks

This article explains how HTTPS secures web communication by combining asymmetric certificate verification with symmetric data encryption, details the role of Certificate Authorities, illustrates the handshake process, and clarifies common misconceptions about its safety and vulnerability to packet capture.

Certificate AuthorityHTTPSMan-in-the-Middle
0 likes · 11 min read
How HTTPS Secures Your Web Traffic: Deep Dive into Protocols, Certificates, and Risks
Liangxu Linux
Liangxu Linux
Dec 30, 2020 · Information Security

Why HTTP Is Dangerous and How HTTPS Protects You from Man-in-the-Middle Attacks

The article explains the vulnerabilities of plain HTTP, illustrates man‑in‑the‑middle attacks, shows why simple symmetric encryption is insufficient, and then details how HTTPS—built on SSL/TLS, asymmetric key exchange, and CA certificate validation—prevents these attacks, providing a comprehensive overview of secure web communication.

CertificateHTTPSMan-in-the-Middle
0 likes · 10 min read
Why HTTP Is Dangerous and How HTTPS Protects You from Man-in-the-Middle Attacks
Top Architect
Top Architect
Dec 17, 2020 · Information Security

Understanding HTTP, HTTPS, and How They Prevent Man‑in‑the‑Middle Attacks

This article explains the fundamentals of the HTTP protocol, demonstrates how its plaintext transmission enables man‑in‑the‑middle attacks, and then details how HTTPS (TLS/SSL) with certificate authority verification and asymmetric key exchange secures web communication against such threats.

Certificate AuthorityHTTPHTTPS
0 likes · 9 min read
Understanding HTTP, HTTPS, and How They Prevent Man‑in‑the‑Middle Attacks
Efficient Ops
Efficient Ops
Oct 8, 2020 · Information Security

Why HTTP Is Insecure and How HTTPS Stops Man‑in‑the‑Middle Attacks

This article explains the inherent insecurity of plain HTTP, demonstrates how man‑in‑the‑middle attacks can intercept and modify traffic, and shows how HTTPS—through SSL/TLS handshakes, RSA key exchange, and a trusted CA hierarchy—protects communications from such threats.

Certificate AuthorityHTTPHTTPS
0 likes · 9 min read
Why HTTP Is Insecure and How HTTPS Stops Man‑in‑the‑Middle Attacks
MaGe Linux Operations
MaGe Linux Operations
Sep 10, 2020 · Information Security

Why HTTP Is Insecure and How HTTPS Protects Against Man-in-the-Middle Attacks

This article explains the fundamentals of the HTTP protocol, illustrates its vulnerability to man‑in‑the‑middle attacks, and details how HTTPS—through SSL/TLS, asymmetric key exchange, and a trusted CA certificate hierarchy—secures communications by encrypting data and preventing interception and tampering.

HTTPHTTPSInformation Security
0 likes · 9 min read
Why HTTP Is Insecure and How HTTPS Protects Against Man-in-the-Middle Attacks
Selected Java Interview Questions
Selected Java Interview Questions
Jun 16, 2020 · Information Security

Understanding the Principles and Security Mechanisms of HTTPS

This article explains why HTTPS is considered secure, details its underlying cryptographic processes—including certificate verification, asymmetric and symmetric encryption, and the role of Certificate Authorities—while also addressing common misconceptions such as man‑in‑the‑middle attacks and packet capture.

CertificateHTTPSMan-in-the-Middle
0 likes · 10 min read
Understanding the Principles and Security Mechanisms of HTTPS
Architecture Digest
Architecture Digest
May 23, 2020 · Information Security

Understanding HTTPS: Principles, Security Mechanisms, and Common Misconceptions

This article explains how HTTPS works by detailing the certificate verification and data transmission phases, the use of asymmetric and symmetric encryption, the role of Certificate Authorities, potential man‑in‑the‑middle attacks, browser validation steps, and why HTTPS does not fully prevent packet capture.

Certificate AuthorityHTTPSMan-in-the-Middle
0 likes · 11 min read
Understanding HTTPS: Principles, Security Mechanisms, and Common Misconceptions
ITPUB
ITPUB
Mar 27, 2020 · Information Security

Was GitHub Hacked? Inside the Suspected MITM Attack on GitHub

In late March, users in China reported errors accessing GitHub Pages and the main site, prompting investigations that suggest a possible man‑in‑the‑middle attack affecting GitHub’s services, with evidence such as a suspicious certificate issued to a QQ email, network hijacking on port 443, and similar disruptions across major Chinese ISPs, while the issue resolved by mid‑afternoon.

ChinaCyberattackGitHub
0 likes · 5 min read
Was GitHub Hacked? Inside the Suspected MITM Attack on GitHub
Architect's Tech Stack
Architect's Tech Stack
Jan 1, 2020 · Information Security

Understanding the Principles and Security Mechanisms of HTTPS

This article explains why HTTPS is considered secure, details its underlying TLS handshake and data transmission process, clarifies the roles of asymmetric and symmetric encryption, the necessity of CA‑issued certificates, and discusses common misconceptions such as man‑in‑the‑middle attacks and packet capture.

CertificateHTTPSMan-in-the-Middle
0 likes · 11 min read
Understanding the Principles and Security Mechanisms of HTTPS
Java Captain
Java Captain
Dec 9, 2019 · Information Security

Understanding the Principles and Security of HTTPS

This article explains how HTTPS secures web communication by combining asymmetric certificate verification with symmetric data encryption, describes the role of Certificate Authorities, outlines the handshake process, discusses man‑in‑the‑middle attacks, and clarifies the limits of HTTPS against packet capture.

Certificate AuthorityHTTPSMan-in-the-Middle
0 likes · 10 min read
Understanding the Principles and Security of HTTPS
ITPUB
ITPUB
May 25, 2017 · Information Security

How HTTPS Defends Against Man‑in‑the‑Middle Attacks: A Deep Dive

This article explains why HTTPS is considered secure, how it prevents man‑in‑the‑middle attacks through certificate verification, details the TLS handshake captured with Wireshark, and shows the cryptographic primitives behind RSA, ECDHE and AES, including practical code snippets and the cost of using HTTPS.

CertificateHTTPSMan-in-the-Middle
0 likes · 19 min read
How HTTPS Defends Against Man‑in‑the‑Middle Attacks: A Deep Dive
Architect
Architect
Oct 25, 2015 · Information Security

iOS Man-in-the-Middle Attack Techniques and Trusted Certificate Management

This article explains iOS man‑in‑the‑middle (MITM) attack levels, demonstrates practical exploits on a jail‑broken iPhone using Burp Suite, and reveals how the hidden TrustStore.sqlite3 file can be manipulated to add or remove trusted certificates beyond what iOS Settings displays.

Man-in-the-Middlecertificate-managementiOS
0 likes · 9 min read
iOS Man-in-the-Middle Attack Techniques and Trusted Certificate Management