DEV Community

Discussion on: Cryptographically protecting your SPA

Collapse
 
zer0uno profile image
zeroUno

I think that the hacker would need to "compromise" in some way the user's browser, for example the hacker could install a fake CA root certificare in the user's browser otherwise he would not be able to tamper the request/response.
The SSL pinning does just that, in fact even if the hacker is able to compromise user's browser, given that the server SSL certificate Is pinned inside your application then response can't be tampered without your application noticing it.

Thread Thread
 
matpk profile image
Matheus Adorni Dardenne • Edited

Think of this attack as a malicious user trying to break things to his advantage (the tool is used by the company to calculate a yearly bonus paid to each employee based on their performance, so there is motivation to try). In this case, the user's browser is the hackers browser.

In a sense it is not a "man in the middle", because it is not a third-party, it's the user himself trying to mess around.