Certificate Chain of Trust
Root CAs: Pre-installed in browsers/OS. Their public keys are implicitly trusted.
Intermediate CAs: Signed by root CAs. Issue end-entity certificates. Provide layer of protection (root stays offline).
End-Entity Certificates: Issued to websites/servers. Prove server identity to clients.
Verification: Browser walks up the chain, verifying each signature until reaching a trusted root.
This is how HTTPS ensures you're connected to the real website!