samedi 7 février 2015

How is HTTPS/SSL able to hide destination website that one is connecting to?



I understand how it is able to create a secure connection via the handshake, but how is it able to initiate a secure connection without first sending an unencrypted request, thus revealing the destination website (but not the data sent or received from/to the destination...) to a potential "man in the middle" attacker...?





Aucun commentaire:

Enregistrer un commentaire