Internet connections typically pass through a dozen routers, any of which could be configured to mount a man in the middle attack. The most important thing to get right is the security handshake. If that's weak, nothing else matters.
I agree. I, and I believe the original proposal, was mostly about offline cracking. But in that case stealing the actual database might be as good as passwords. :) -- Mgr. Jiří Činčura Independent IT Specialist
------------------------------------------------------------------------------
Firebird-Devel mailing list, web interface at https://lists.sourceforge.net/lists/listinfo/firebird-devel