Since the protocol encrypts all customer-server communications by SSL/TLS authentication, attackers simply cannot intercept data, meaning customers can safely enter their individual info. Usually, the certification incorporates the name and e-mail address in the approved person and is instantly checked because of the server on each connection to verify the http://XXX