On Monday 02 March 2009, Tony Finch wrote:

> > The fault is having the relatively simple problem of encryption entangled
> > with the complex problem of identification.
>
> But they have to be otherwise the encryption is worthless :-(

        I think the point made by the original poster is valid, if you use a 
encrypted unauthenticated connection you cannot just be sniffed, you need to 
be subject to a MITM or similar attack. Maybe I'm not seeing something here.

Patxi.


Reply via email to