A mobile application developer wants to secure an application that transmits sensitive information. Which of the following should the developer implement to prevent SSL MITM attacks?
A. Stapling
B. Chaining
C. Signing
D. Pinning
A mobile application developer wants to secure an application that transmits sensitive information. Which of the following should the developer implement to prevent SSL MITM attacks?
A. Stapling
B. Chaining
C. Signing
D. Pinning