Tagged articles
3 articles
Page 1 of 1
Architect's Guide
Architect's Guide
Oct 14, 2025 · Information Security

How HTTPS Secures Web Traffic: Deep Dive into Certificates and Encryption

This article explains why HTTPS is considered secure, details the underlying TLS handshake—including certificate verification and symmetric data encryption—and clarifies common misconceptions such as the role of CAs, the possibility of man‑in‑the‑middle attacks, and whether HTTPS traffic can be intercepted.

Certificate AuthorityHTTPSMITM attack
0 likes · 11 min read
How HTTPS Secures Web Traffic: Deep Dive into Certificates and Encryption
Open Source Linux
Open Source Linux
May 30, 2022 · Information Security

Can Your WeChat Chats Be Snooped? Understanding Encryption and Network Monitoring

This article examines whether WeChat messages can be intercepted via network monitoring, explains the security guarantees of modern chat apps through asymmetric and symmetric encryption, explores how network behavior management tools could capture communications, and offers practical advice on protecting against such threats.

MITM attackNetwork MonitoringWeChat security
0 likes · 10 min read
Can Your WeChat Chats Be Snooped? Understanding Encryption and Network Monitoring
MaGe Linux Operations
MaGe Linux Operations
May 3, 2022 · Information Security

Can Your Wi‑Fi Spy on WeChat? Understanding Chat App Security and Encryption

This article explains how chat applications like WeChat protect messages with asymmetric and symmetric encryption, why network administrators generally cannot read chat content, and what alternative monitoring methods (such as installed surveillance software, system vulnerabilities, or compromised private keys) could expose your conversations.

MITM attackNetwork MonitoringWeChat security
0 likes · 9 min read
Can Your Wi‑Fi Spy on WeChat? Understanding Chat App Security and Encryption