GuéhadforStack Overflowed..stack-overflowed.hashnode.dev·Dec 16, 2024SSL Pinning & Beyond (Part 1)A while ago an application we’ve been working on was submitted to a penetration test during which a possibility of man in the middle attack was exploited. We then embarked on a journey to find the best solutions & stumbled upon multiple options so we...SSL Pinning JourneySSL
Rathishrathish.hashnode.dev·May 1, 2023Hostname Verification: Preventing Man-in-the-Middle AttacksA man-in-the-middle attack is a cyberattack where an attacker intercepts the communication between two parties to eavesdrop, modify, or manipulate the conversation. The attacker can intercept the communication by intercepting the network traffic, usu...34 readsSecurity