Answer the question
In order to leave comments, you need to log in
How is it theoretically possible to set up an encrypted channel?
Suppose that in my country some Internet resource is blocked, that is, the request to the provider to provide content at the given address is not transmitted by the provider. Moreover, if I connect to some Tor, then a connection will occur between me and the proxy servers, in which, as far as I know, we will exchange keys to decrypt the traffic that is transmitted from there to here.
Question: if the key has not yet been transferred, then during the initial key exchange, our traffic is not yet protected from the provider (including, as I understand it, the transmitted keys), that is, the keys are visible to the provider during our initial interaction and it can potentially use them for traffic decryption?
Answer the question
In order to leave comments, you need to log in
If the remote resource works via HTTPS, it does not matter at all how many compromised proxies are on the way from you to the node - HTTPS guarantees protection from MitM, provided that you do not do stupid things (do not install left-handed certificates and check the certificates of the sites you work with for validity All kinds of
bad things can happen with HTTP, but what sane resource in the 2020s is using HTTP?
It doesn't quite work that way. With symmetric encryption, yes, you must exchange keys through a trusted medium. With non-symmetric encryption, there is a public key and a private key, one of them encrypts the data, the other decrypts. For example, you publish the encryption key, anyone can encrypt the data, but only you can decrypt it back. If I give you an encryption key through open channels, then you can be sure that only the person who gave you this key can decrypt your message (while maintaining the secret of the private key).
A mitm attack can be implemented here, when the key is not passed to you by the final recipient, but by an intermediate one. For such cases, a trusted third party is introduced, the trust of which is established "preliminarily".
that is, the keys are visible to the provider during our initial interaction
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question