This is in response to the following article: https://www.nytimes.com/2018/04/16/world/europe/us-uk-russia-cybersecurity-threat.html
“The officials said the Kremlin was often utilizing what were known as man-in-the-middle attacks, in which hackers secretly inserted themselves into the exchange of data between a computer or server in order to eavesdrop, collect confidential information, misdirect payments or further compromise security.”
Man In The Middle Attack
With the increasing effort of individuals breaking into government, corporate, and private networks today, there needs to be a solution preventing hackers from inserting themselves into the communication on the internet, thus stopping potential “man-in-the-middle” attacks.
What if it didn’t matter if hackers were able to break in and monitor internet traffic on a network?
The “man-in-the-middle” attack is a common, effective, and often undetectable attack that typically involves a compromised certificate to assume the identity of one end of the communication. This is like information being passed over the internet without protection.
DTRelay is middleware that provides authentication (extra protection) without exposing client-side tokens where hacking occurs. DTRelay hides the secret information being passed over the internet.
DTRelay prevents the “man-in-the-middle” attack by using a request signature and encrypting protected parameters. You can look at it like it puts an armored guard around the information being passed.
DTRelay protects communications on any device connected to the internet, where hackers are trying to steal personal information. DTRelay makes it impossible to expose your secure data to hackers.
All that needs to be done is for DTRelay to be implemented in front of the application’s API, and DTRelay does the rest.