{"id":133,"date":"2014-10-10T12:55:11","date_gmt":"2014-10-10T12:55:11","guid":{"rendered":"https:\/\/noahs-blog.net\/?p=133"},"modified":"2014-10-10T17:21:24","modified_gmt":"2014-10-10T17:21:24","slug":"how-to-stop-man-in-the-middle-attacks-part-3","status":"publish","type":"post","link":"https:\/\/noahs-blog.net\/?p=133","title":{"rendered":"How to Stop Man in the Middle Attacks Part 3"},"content":{"rendered":"<p>You may have heard of something called a &#8220;trusted third party&#8221; before while using a web browser. This is usually used in reference to security certificates. This might seem confusing at first but it&#8217;s actually very simple.<\/p>\n<p><strong>The situation:<\/strong><br \/>\nAlice and Bob have come up with a nearly fool proof way to stop people from eavesdropping on them. The last thing they need to do is get Alice&#8217;s public key to Bob through Mallory without Mallory modifying the key or replacing it. <\/p>\n<p>To do this they use Trent. Trent has started his own business of securely transmitting public keys for people.<\/p>\n<p>The idea is that everyone already has Trent&#8217;s public key. Alice simply needs to securely send her public key over to Trent and he&#8217;ll sign it with his public key and send it out to anyone who asks for it. This way Bob doesn&#8217;t need to have Alice&#8217;s public key ahead of time just to be able to create an encrypted connection with her.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>You may have heard of something called a &#8220;trusted third party&#8221; before while using a web browser. This is usually used in reference to security certificates. This might seem confusing at first but it&#8217;s actually very simple. The situation: Alice and Bob have come up with a nearly fool proof way to stop people from &hellip; <a href=\"https:\/\/noahs-blog.net\/?p=133\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">How to Stop Man in the Middle Attacks Part 3<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-133","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/noahs-blog.net\/index.php?rest_route=\/wp\/v2\/posts\/133","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/noahs-blog.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/noahs-blog.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/noahs-blog.net\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/noahs-blog.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=133"}],"version-history":[{"count":2,"href":"https:\/\/noahs-blog.net\/index.php?rest_route=\/wp\/v2\/posts\/133\/revisions"}],"predecessor-version":[{"id":137,"href":"https:\/\/noahs-blog.net\/index.php?rest_route=\/wp\/v2\/posts\/133\/revisions\/137"}],"wp:attachment":[{"href":"https:\/\/noahs-blog.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=133"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/noahs-blog.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=133"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/noahs-blog.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}