Networking Security Part 2: Verifying and Connecting
Welcome to the second article of a series of three, about the subject of security in networking applications, TLS, certificates, keys, and more. Part 1: What is TLS? Part 2: Verifying and Connecting Part 3: Trust and Certificate Chains In the first part, we learnt about TLS/SSL, certificates, CAs and Keys. If you havenât read it […]