let's say there is a user purchasing something on a website that has a valid SSL certificate
I understand that the user's computer will use the website's public key to encrypt and send to the website which will then decrypt the user's data with the website's private key
the thing I'm wondering about is when a website encrypts data with its private key to send back to the user. the user's computer will decrypt with the website's public key.
doesn't this actually represent a security risk because anyone that intercepts the website's transmission to the user can decrypt the data with the website's public key?
another question, if a website has an invalid SSL certificiate (let's say the website name doesn't match what is stated on the cert), does a HTTPS connection still take place if the user tells the browser to proceed?
thanks for the help
I understand that the user's computer will use the website's public key to encrypt and send to the website which will then decrypt the user's data with the website's private key
the thing I'm wondering about is when a website encrypts data with its private key to send back to the user. the user's computer will decrypt with the website's public key.
doesn't this actually represent a security risk because anyone that intercepts the website's transmission to the user can decrypt the data with the website's public key?
another question, if a website has an invalid SSL certificiate (let's say the website name doesn't match what is stated on the cert), does a HTTPS connection still take place if the user tells the browser to proceed?
thanks for the help