Man in the Middle Attacks Explained

In this short video, ZKX Software Engineer Emerald Rafferty explains what a “man in the middle” attack is, gives us a theoretical and a real-world example of where this may occur, and explains how ZKX technology mitigates this type of cyber attack, keeping the user, and their device safe from cyber adversaries.