Published On Sep 15, 2022
This video explains in detail the infamous Man-in-the-middle attack used to hack into P2P-encrypted chat sessions.
0:00 Man-in-the-middle attacks. Why are they possible?
0:47 Packet inspection software as a hacker tool
2:07 Relaying a Wi-Fi connection with a Hotspot emulator
3:29 Viewing an IRC session with Network Monitor Tool
4:12 How does Point-to-point (P2P) encryption work?
7:47 Man-in-the-middle attack on P2P encryption.
10:20 Tips for secure messenging
Video on geo-tracking: • How THEY are Watching your MOBILE. Tr...
Image by upklyak on https://Freepik.com
Image by macrovector on https://Freepik.com
Image by rawpixel.com on Freepik
Stock footage by https://www.videvo.net/
Stock footage by https://www.videezy.com/
Stock footage by https://mixkit.co