So this video explains how https works. What I don’t get is what if a hacker in the middle pretended to be the server and provided me with the box and the public key. wouldn’t he be able to decrypt the message with his private key? I’m not a tech expert, but just curious and trying to learn.

  • qwerty@discuss.tchncs.de
    link
    fedilink
    English
    arrow-up
    1
    arrow-down
    9
    ·
    2 months ago

    This is slightly off-topic but I was thinking about it and all of thoes isues can be solved by utilizing blockchain. Imagine a world where instead of CAs, decentralized domain (unstoppable domains, ENS etc.) owners publish their pub keys to the blockchain, the client can than query multiple nodes or store the chainstate locally. When establishing a connection client sends a secret handshake message + clients’ pub key encrypted with domains’ pub key. To complete the handshake server responds with the same secret message encrypted with clients’ pub key.

    • lily33@lemm.ee
      link
      fedilink
      English
      arrow-up
      1
      ·
      2 months ago

      It seems to me like a MITM hacker can just redirect all requests to a Blockchain node towards their malicious node.