Key-Exchange-Method/EN/Consequence: Unterschied zwischen den Versionen
Zeile 1: | Zeile 1: | ||
− | + | Your server is ready to establish very weak connections, which are vulnerable to Man-in-the-middle attacks. This can be used, for example, to read out passwords or credit card information and misuse them for criminal purposes. |
Aktuelle Version vom 11. Juni 2019, 12:28 Uhr
Your server is ready to establish very weak connections, which are vulnerable to Man-in-the-middle attacks. This can be used, for example, to read out passwords or credit card information and misuse them for criminal purposes.