123
2012-09-03 07:57:49 UTC
If a password has been shared out of band, for example a text messages, then the password that will be used to encrypt the traffic can be intercepted. So, if I'm creating an online account, the transaction is susceptible to interception.
Wait, you say! What about Asymetric encryption that uses public and private keys? The man-in-the-middle can intercept the public key transaction and replace them with their own. But I can confirm the origin of the public key with a Certificate Authorities! Well, what channel do you think the response from the CA saying the man-in-the-middle certificate is invalid comes on? The same channel the man-in-the-middle is using to intercept data. CA says my public key isn't originating from the legitimate server? I'll change that response to say that it is.
Am I wrong?
I'm studying security and this seems to defeat the purpose of encryption.
Thanks.