So let me play devil's advocate for a moment: You could say that the
browser has two components: One in the phone and one in a server
somewhere. The two components communicate over a channel provided by
good old https. The phone component sends the request to the server
component, which in turn forwards it to the remote server and then
transforms the response into a more compact form before sending it
back to the phone component. Thus no MITM, just a clever bit of
distributed computing.

The notion of the user as one end point of the protected channel is
illusory anyway; in reality, it the browser that is the end point.
What human being does SSL in his head anyhow? The only unusual thing
about this setup is that the browser is a bit here, a bit there. And
(now slipping out of my devil's advocate role) there is undoubtedly
more possibilities for exposure of sensitive data, as this data exists
unencrypted in an unexpected place.

- Harald
_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to