This post is about Man in the Middle (hereby refered to as MITM) attacks. MITM refers to the hacker, with computer C, tapping the line between computer A and computer B. If there was not any previous connection between A and B, C can see all communication, no matter the security. Let us imagine a simplification. A says “let’s use algorithm X” B sees this and says, in algorithm X, “OK, here’s your webpage”. C sees A changing the algorithm and decrypts all traffic in algorithm X, seeing the webpage. I can see no way to get around this other than A) send the information along a different path or B) if the hacker taps the conversation after it has started. If anyone knows another way, please comment.