Hi Pacharapol. Yes in a way, we can say that both point 1 and 2 looks like it's man-in-the-middle attack, since in both someone is listening to the private message. But in point 1, no one is tampering the data, they are eavesdropping, while in point 2 the data is been intercepted.
Regarding the other question, let's encrypt is a legitimate certificate authority itself, so they are of course covering point 3 for you - i.e identifcation.
For further actions, you may consider blocking this person and/or reporting abuse
We're a place where coders share, stay up-to-date and grow their careers.
Hi Pacharapol. Yes in a way, we can say that both point 1 and 2 looks like it's
man-in-the-middle
attack, since in both someone is listening to the private message. But in point 1, no one is tampering the data, they are eavesdropping, while in point 2 the data is been intercepted.Regarding the other question,
let's encrypt
is a legitimate certificate authority itself, so they are of course covering point 3 for you - i.e identifcation.