After handshake
one could be assure that data are encrypted and secure.
But before that, handshake
parameters are transferred via not secured channel. One could be MitM
during the handshake
procedure.
Why it's not a problem? What actions minimize the threat?