There’s a server, a client, and a hacker in a network. For encryption, the client and the server need to share their private keys. Wouldn’t the hacker be able to grab those during their transmission and decrypt further messages as they please?

  • Sagar Acharya@sopuli.xyz
    link
    fedilink
    arrow-up
    0
    arrow-down
    1
    ·
    3 months ago

    Certifying Authority ensures secure connection establishment. If CA is corrupt, your system will work.