In short, you would lose authentication and guarantees of privacy if you don't have each other's public keys, but it shouldn't affect the connection in any way, even for anonymous access.

You totally ignore man-in-the-middle attacks, don't you?

I'm sorry, I was unclear in what I meant when I wrote that. When I wrote "...but it shouldn't affect the connection in any way, even for anonymous access.", I meant from a code point of view. The Monotone source will see the (fake/anonymous/whatever you want to call it) public keys, and use them the same way as if you had real keys and real authentication. I make no guarantees about security without authentication! ;)

Thanks,
Cem Karan


_______________________________________________
Monotone-devel mailing list
Monotone-devel@nongnu.org
http://lists.nongnu.org/mailman/listinfo/monotone-devel

Reply via email to