Insecure connections would be the last thing we’d want nowadays. So how do the latest communication protocols manage to have them securely?

Photo by Caspar Camille Rubin on Unsplash

In whatever kind of WebApp or API, different requests have to be there. Before a request reaches the destination, it needs to go through some hops over routers/network devices in the path to server (use Traceroute to list these network devices that your requests go through). You never know who might be listening to your network calls. So the best and probably the only way to protect them is to encrypt all the communication, so that even if…

Meet Patel

GSoC '20 | DAIICT | CS | DSC Lead

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store