books

books

The concept of full-stack was pronounced dead at the close of 2019.
2020 Stack is the new name for the new generation. Follow ⚪⚪⚪

windrose

Encryption layer

Network stack

Hackers, crackers and cyberworld encryption. When you need to safely transfer data between two trusted parties, using the Internet's insecure public network—where hackers, crackers, snoopers and sniffers are lurking—today's encryption technology is the answer for circumventing theft and misuse.

Layers

Five-layered approach to network operations:

Today's technology uses the concept of public-private key pairs, where encryption by the sender is done using a well-known publicly available passphrase, and decryption is done at the other end, by the receiver, using a different, but matched, top-secret passphrase.

The initial transfer of the public key, from the ultimate receiver to the proposed sender, is done using the TLS/SSL (Transport Layer Security / Secure Sockets Layer) protocol. The process of encryption happens within the browser; the process of decryption happens within the server; and the network transmission of the encrypted data stream occurs using HTTP through a designated channel to prevent siphoning: port 443 for HTTPS instead of port 80 for HTTP.

And all of this is done without any user intervention: pretty cool idea!