What are “man-in-the-middle (MITM)” attacks? Does Stealthphone information security system prevent them?

← Back

What are “man-in-the-middle (MITM)” attacks? Does Stealthphone information security system prevent them?

“Man-in-the-middle” (MITM) attack cryptographic term is used to mean a situation when an attacker can voluntarily read or modify messages the subscribers are exchanging, but none of them is aware of the stranger in the network.

Stealthphone information security system utilizes strong algorithms and a user authentication module to protect you against “man-in-the-middle (MITM) attacks.

Technical support

Could not find the answer? Contact our customer support

Submit question