> David Hobby Fri, 15 Jun 2012 10:35:51 -0700:
>
Between ALL communications channels, even the public ones?  That's
asking rather a lot of Eve. I think there are a lot of people who
would use a cryptographic system that required an additional open
channel, confident that they could somehow route around Eve most of
the time. (Alice and Bob could be just posting their versions of the
public information on their respective websites, and checking that
they agreed.)

So Eve Man-in-the-middles Bob's connection to his webserver. Bob thinks he's writing information to correlate with Alice. What actually happens is Eve replaces the data Bob uses with the data from the Eve-Alice connection. When Bob is connected to the website he see's the information he thinks he's posted (Because Eve knows to change it back for him, and only him, (also Alice's website data must be changed for Bob and only Bob)). Etc.

Complicated? Yes, But plausible (this is sort of how the Sony Rootkit worked).

But yes, it's a minor flaw that was not mentioned in the press
release.

Seems like it might be impractical.  CITOKATE.

_______________________________________________
http://box535.bluehost.com/mailman/listinfo/brin-l_mccmedia.com

Reply via email to