Problem:
Question 1- Explain how hash codes are used to protect passwords and passphrases.
Question 2- Explain how a man-in-the-middle attack works. Is it possbile to set up a man-in-the-middle attack without breaking the law?
Question 3- Explain how people use digital fingerprints in connection with public keys. When are they useful?
Please read all the questions carefully and answer them.