zlacker

[parent] [thread] 0 comments
1. Nextgr+(OP)[view] [source] 2020-06-05 04:16:55
They can still pull off an MITM attack by sending the MITM’s keys (pretending to be the other user’s keys) because they control they key exchange.

It’s an active attack and can’t apply retroactively but within these constraints they can still do it.

[go to top]