24
Is public WiFi actually dangerous?
(lemm.ee)
c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.
THE RULES
Instance Rules
Community Rules
If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.
Learn about hacking
Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !securitynews@infosec.pub !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub
Notable mention to !cybersecuritymemes@lemmy.world
Fear the man in the middle
For most purposes, doesn't HTTPS thwart MITM attacks? It's designed to be resilient against MITM for the whole chain through your ISP and other gateways to the destination, no?
Only if you start with HTTPS but browsers have favored HTTP for backwards compatibility as the default protocol when something is entered in the address bar until very recently (less than a year for any browser to do that by default via HTTPS). Usually users don't notice because websites redirect to HTTPS but technically a MITM attacker could just redirect you somewhere else.
But even then, theoretically, even if not default, could you not just block the first request to HTTPS site causing fallback to HTTP and then redirect elsewhere for the purpose of nice lock icon?
If you have a HTTP fallback on HTTPS failure that might work, but only if the site doesn't use HSTS and this is the first request on that client. I skipped over HSTS preloading in my earlier explanation which also addresses this issue for sites on the browsers list at least.