Follow-up Comment #3, sr #110907 (project administration): Let us imagine that the message with the hash is intercepted; then it would be possible for the interceptor to impersonate that user in that tracker item, wouldn't it?
_______________________________________________________
Reply to this item at:
<https://savannah.nongnu.org/support/?110907>
_______________________________________________
Message sent via Savannah
https://savannah.nongnu.org/
