I've just seen a Youtube video with an advertisement for NordVPN in which they claim that NordVPN would protect passwords when people are on potentially malicious coffee shop WLAN.
That seems strange to me as basically all websites use HTTPS today. At least all I care about (e.g. banking, email, e-commerce, ...).
I assumed that this means the connection is encrypted - meaning an attacker can see which websites I'm using / how much traffic goes there, but not the content of that traffic.
The design of the TLS handshake should also ensure that there is no issue in the very beginning of the communication:
- I assumed the key exchange was first done with Public-key-cryptography (where it doesn't matter if the attacker reads it) and later with symmetric cryptography (for efficiency).
- I also thought that certificates were used to ensure I am actually talking with the service and not with a man-in-the-middle.
Do I have a wrong assumption?