Monster-in-the-middle attacks can be mitigated by ensuring that traffic is encrypted en route. Let's see how.