Definitions
from Wiktionary, Creative Commons Attribution/Share-Alike License.
- noun An
adversary thatintercepts , and often modifies,communications .
Etymologies
Sorry, no etymologies found.
Support
Help support Wordnik (and make this page ad-free) by adopting the word man-in-the-middle.
Examples
-
When users in Iran went to a Google site, including Gmail and Google Docs, they could be intercepted by the impostors in what is known as a man-in-the-middle attack.
NYT > Home Page By SOMINI SENGUPTA 2011
-
Breaking into a secure link is known as a "man-in-the-middle attack."
-
Breaking into a secure link is known as a "man-in-the-middle attack."
unknown title 2011
-
When users in Iran went to a Google site, including Gmail and Google Docs, they could be intercepted by the impostors in what is known as a man-in-the-middle attack.
NYT > Home Page By SOMINI SENGUPTA 2011
-
Breaking into a secure link is known as a "man-in-the-middle attack."
unknown title 2011
-
But what if instead of merely eavesdropping, the malicious party actually interferes with the connection, placing itself between the client and the server, intercepting everything sent between the two, known as a man-in-the-middle MITM attack .
Ars Technica Peter Bright 2011
-
The discovery was made when the developer used a tool called a "man-in-the-middle," which could watch what data was sent to and from an application in real time.
Washington Post: Breaking News, World, US, DC News & Analysis Joshua Topolsky 2012
-
Spoofing those Web sites would allow the Iranian government to use what's known as a man-in-the-middle attack to impersonate the legitimate sites and grab passwords, read e-mail messages and monitor any other activities its citizens performed, even if the connections were protected with SSL Secure Sockets Layer encryption.
CNET News.com 2011
-
Spoofing those Web sites would allow the Iranian government to use what's known as a man-in-the-middle attack to impersonate the legitimate sites and grab passwords, read e-mail messages, and monitor any other activities its citizens performed, even if Web browsers show that the connections were securely protected with SSL encryption.
CNET News.com 2011
-
My answer concerned a man-in-the-middle attack I once did on Craigslist personals.
Antonio Garcia-Martinez: Pseudorandomness, Or How I Got Into Y Combinator and Had a Child With a Woman I Barely Knew, Almost Simultaneously Antonio Garcia-Martinez 2010
Comments
Log in or sign up to get involved in the conversation. It's quick and easy.