Confirmed users, Administrators
5,526
edits
Line 54: | Line 54: | ||
* Revealing personal information such as usernames and passwords. | * Revealing personal information such as usernames and passwords. | ||
* Downloading malware if they believe it’s coming from a trusted site. The malware can contain malicious content or software. | * Downloading malware if they believe it’s coming from a trusted site. The malware can contain malicious content or software. | ||
It is important to note that possession of the mis-issued certificate alone does not allow an attacker to do anything. They also need some control of the victim's network connection. This means that the most likely attacks are either very localized (shared WiFi, local network compromise) or very broad (governments). | It is important to note that possession of the mis-issued certificate alone does not allow an attacker to do anything. They also need some control of the victim's network connection. This means that the most likely attacks are either very localized (shared WiFi, local network compromise) or very broad (governments). |