On Mar 10, 2017, at 2:53 AM, Joerg Sonnenberger <jo...@bec.de> wrote:
> 
> On Thu, Mar 09, 2017 at 01:37:35PM -0700, Warren Young wrote:
>> 
>> 
>> That can be gotten around with a MITM attack
> 
> It still only matters if you can *introduce* objects.

You’re telling me it’s of no consequence if, during a sync from one repository 
to another, a MITM is able to replace the artifact representing the tip of 
trunk for one file with a different artifact having the same SHA-1 hash?
_______________________________________________
fossil-users mailing list
fossil-users@lists.fossil-scm.org
http://lists.fossil-scm.org:8080/cgi-bin/mailman/listinfo/fossil-users

Reply via email to