diff --git a/index.html b/index.html
index eb72fec..d92a304 100644
--- a/index.html
+++ b/index.html
@@ -173,10 +173,10 @@ layout: false
| Protocol | Published | Status |
| ----------- | ----------- | -------- |
| SSL 1.0 | Unpublished | Unpublished |
-| SSL 2.0 | 1995 | Deprecated in 2011 (RFC 6176) |
+| SSL 2.0 | 1995 | Deprecated in 2011 (RFC 6176) |
| SSL 3.0 | 1996 | Deprecated in 2015 (RFC 7568) |
-| TLS 1.0 | 1999 | Deprecation planned in 2020 |
-| TLS 1.1 | 2006 | Deprecation planned in 2020 |
+| TLS 1.0 | 1999 | Deprecated in 2021 (RFC 8996) |
+| TLS 1.1 | 2006 | Deprecated in 2021 (RFC 8996) |
| TLS 1.2 | 2008 | |
| TLS 1.3 | 2018 | |
@@ -263,7 +263,7 @@ show certificate
So, how does a certificate get signed?
]
-
+
???
Or how does this signing work:
@@ -279,7 +279,7 @@ Or how does this signing work:
Now anyone can verify the signature:
]
-
+
???
Now anyone can verify the signature by:
- decrypting the signature with the CAs public key
@@ -340,6 +340,17 @@ This is where the client and server decide on:
9. Secure symmetric encryption achieved: The handshake is completed, and communication continues using the session keys.
---
.left-column[
+## Key exchange, no certificate?
+]
+.right-column[
+This is where the Diffie Hellman key exchange helps
+
+
+
+.footnote[Borrowed from: (https://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange)]
+]
+---
+.left-column[
## TLS1.3
]
.right-column[