natirips wrote:
@Samtron: As for man-in-the-middle attacks: unless the attack began in the middle of transmission, there is no defense that I can think of that would stop them from getting any information that you transmitted. If you/server can decode a transmission, so can they using the same algorithm. Especially if they also have your encryption key which you and server exchanged anyway.
Wait wait wait. no no no no...
I recommend reading about asymetric encryption (2 keys, one encrypts, otherone decrypts), good stuff...
Also for the MITM
http://en.wikipedia.org/wiki/Transport_Layer_SecurityOnly known possible attack was already fixed in TLS 1.1 (altough it was bit surprise that something was even found (but it used Java aplet
))
Also fun reading and yet understandable is for example diffie-helmann algorithm, how without any secure connection nor preshared knowledge 2 entities can make secure connection:
http://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchangeOfc, anyday vulnerabilty could be found, but yeah...
But another joke is CAs(certificate authorities), where big fucking money flows, as big as security holes that come with this system.