DEV Community

Discussion on: Why do we need HTTPS?

Collapse
 
patarapolw profile image
Pacharapol Withayasakpunt

What is the difference between number One and Two? I think both are correlated, i.e. man-in-the-middle.

I used Let's Encrypt --- how do I make use of number Three? Is it impossible without HTTPS?

Collapse
 
hellomeghna profile image
Meggie

Hi Pacharapol. Yes in a way, we can say that both point 1 and 2 looks like it's man-in-the-middle attack, since in both someone is listening to the private message. But in point 1, no one is tampering the data, they are eavesdropping, while in point 2 the data is been intercepted.

Regarding the other question, let's encrypt is a legitimate certificate authority itself, so they are of course covering point 3 for you - i.e identifcation.