101
what if the hacker provided the public key for https connection?
(www.youtube.com)
This is a most excellent place for technology news and articles.
Nevermind hackers. Look up "corporation in the middle" attacks, which is a prime example of subverting secure channels at scale.
If you don't own the hardware, nothing you do on it is truly private. Ditto if someone else has admin access to your hardware (eg BYOD scenarios) . Inserting a root certificate into the OS is trivial in both cases.