DEV Community

Discussion on: Why do we need HTTPS?

Collapse
 
hellomeghna profile image
Meggie

Hi Pacharapol. Yes in a way, we can say that both point 1 and 2 looks like it's man-in-the-middle attack, since in both someone is listening to the private message. But in point 1, no one is tampering the data, they are eavesdropping, while in point 2 the data is been intercepted.

Regarding the other question, let's encrypt is a legitimate certificate authority itself, so they are of course covering point 3 for you - i.e identifcation.