How Internet Security Works: Part I
Have you ever wondered how your communications, and general data transfer over the internet, stays secure and confidential? It is actually quite an intricate process, and involves complex mathematics, cryptographic algorithms and identity-verification infrastructure that is constantly operating in the background.
In this series of blog posts, I would like to give a high-level overview of how internet security works. I emphasize that this is only a high-level and general overview, as an in-depth dive into this is a multidisciplinary endeavor that would require hundreds of pages, at the very least (and be, in truth, outside of my competence). Given that this is a mere introduction into internet security, for the sake of readability and accessibility I have simplified some concepts and omitted others.




















