Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Ah, nice timing with your message. I think we wrote the same concerns.

It's not just that the servers public key can be replaced on the victim's machine, but also an attacker can send their own public key instead of the victims to the server. During a MITM attack, all traffic would be fully viewable to an attacker without anyone really being the wiser.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: