How do we know that our SSL certificates are to be trusted?

On Linux, the /etc/ssl/certs folder includes all the necessary public keys for Certificate Authorities. If I have not misunderstood something, this makes it possible to verify public keys received from other servers over the internet.
But … Continue reading How do we know that our SSL certificates are to be trusted?

Is wavefunction collapsing in quantum physics a property that could be used to detect man-in-the-middle attacks? [closed]

Assuming wavefunction collapsing means that observing a thing changes it by making the observed thing collapse to some state from a set of possible states, and that this property is a property of the real world instead of just a way of mod… Continue reading Is wavefunction collapsing in quantum physics a property that could be used to detect man-in-the-middle attacks? [closed]

Why can’t MITM attacker steal SSL certificate and behave like a server before key exchange? [duplicate]

Before key exchange, since there is no encryption, an attacker can copy certificate section of http request and create a new http request with his own ip address. After that, attacker can create a secure communication with client. To preve… Continue reading Why can’t MITM attacker steal SSL certificate and behave like a server before key exchange? [duplicate]

Is NordVPN changing my security cerificates? Could this be a MiTM attack?

I noticed that when it comes to some websites (e.g. Twitter), the security certificate is changed when I log in and out of NordVPN – the SHA-1 digest is visibly different.
Keep in mind that not only I log out, but also deactivate nordvpnd … Continue reading Is NordVPN changing my security cerificates? Could this be a MiTM attack?