man-in-the-middle :(

Unfortunately increasingly up to the information that travels through secure connections are vulnerable to providers, services that they want at any cost access to personal information.

How can I prevent attacks of type man-in-the-middle ? Is There any configuration or tool that decrease the chance of eavesdropping ???

What the experts here think or suggest in this case? :slight_smile:

Thanks :-TU

Well good point, I also like to know this. Sorry because I don’t have any suggestion at this point. :-[

That sounds like something for the world of politics to solve.

Are you referring to spying by government agencies like NSA or to providers, sites, etc with rogue intentions?

  1. Make sure you are in control of the device (eg: no malware etc)
  2. Encrypt data for the recipient

Your participation in this topic also enriches the conversation :slight_smile:

EricJH,
For example, i once read that internet providers were adopting the practice of intercept and data decryption secure connections from the browser. Also read the case in which a telephone company performed the decryption traffic of the secure connections on mobile devices.

Thanks Melih , I will be more attentive to these details. :slight_smile:

Melih,
I found a service on site (GRC | SSL TLS HTTPS Web Server Certificate Fingerprints  ) that allows the verification of “authentic security certificate fingerprint” and if the connection has extended validation certificate.

In this case perform this check (SHA1 fingerprint hash) can help to prevent the interception of a secure connection?

I’m going to copy and paste something I wrote a few days ago to save me some time typing
Here’s a solution, use a VPN (or even a trusted proxy) and a good dns server <–must have both

If using a VPN like some people and businesses do, And using comodos firewall and comodos dns, If properly configured theres no leaks therfore no need to use your isp’s dns Wink The author probably never took this into consideration

Also if intreasted, on configuring vpn and dns to prevent dns leaks (see below)

If your not using airvpn, then you’ll obiously have to switch some of the numbers around.

internet providers were adopting the practice of intercept and data decryption secure connections from the browser
Your not going to want to use your isp dns server then, there's plenty out there. Comodo has there own secure dns if intreasted http://www.comodo.com/secure-dns/

Under quick links, vista instructions are the same for windows 7 and 8 :-La . The step by step process is easy and has pictures too

As for VPN and such. I don’t know much about any free ones besides ■■■ and TOR (very slow speed) ALSO your going to have to trust the VPN company too as your traffic is being rerouted through them.
Comodo offers there own VPN too

rustConnect Wi-Fi Security Features:
Securely encrypts all data transmitted over both wired and wireless Internet connections
Creates a Virtual Private Network to hide all personal web-surfing information
Utilizes industry-standard 128-bit encryption</blockquote>

another good vpn is vypr

also airvpn
https://airvpn.org/

+1 for Steve Gibson’s site. Great tools there.

The best way to prevent man-in-the-middle attacks is to use peer-to-peer (P2P) authentication - with this method, each device basically validates that the other is legitimate. … snipped by Mod …

mod edit: some content removed, considered advertising. kail