When trust is secure

Alice connects to Bob remotely using the internet. For example, Bob may run a commercial website from which Alice wants to purchase goods or services.

Figure 3. Communication in a trusted world


Communication in a trusted world

In Figure 3, Alice and Bob are both authentic and legitimate. Communication between them is safe.