Since the protocol encrypts all customer-server communications as a result of SSL/TLS authentication, attackers cannot intercept information, that means people can properly enter their own information. Usually, the certificate is made up of the identify and e-mail address from the approved consumer which is automatically checked from the server on http://XXX