Internet connections typically pass through a dozen routers, any of which could 
be configured to mount a man in the middle attack.  The most important thing to 
get right is the security handshake.  If that's weak, nothing else matters.

I agree. I, and I believe the original proposal, was mostly about offline 
cracking. But in that case stealing the actual database might be as good as 
passwords. :)

--
Mgr. Jiří Činčura
Independent IT Specialist


------------------------------------------------------------------------------
Firebird-Devel mailing list, web interface at 
https://lists.sourceforge.net/lists/listinfo/firebird-devel

Reply via email to