Hi,
Thomas Reinke wrote:
>
> What you're basically saying is that if someone can sniff packets, and
> brute force their way into decrypting the information, is their
> data safe, and is this a possible scenario.
The point in this application is, that the sniffing person
also has to be able to
What you're basically saying is that if someone can sniff packets, and
brute force their way into decrypting the information, is their
data safe, and is this a possible scenario.
No, their data won't be safe. Yes, this is possible. There are
plenty of studies that have shown how much computing po
Stephan Bauer wrote:
>
> Hi,
>
> I would enjoy hearing some opinions on the following
> potential scenario :
>
> The SSL-Client does no client-auth. and has to transmit
> one string, that contains security-sensitive data.
> Let's think of a man-in-the-middle you leaves through
> the handshake-p
Hi,
I would enjoy hearing some opinions on the following
potential scenario :
The SSL-Client does no client-auth. and has to transmit
one string, that contains security-sensitive data.
Let's think of a man-in-the-middle you leaves through
the handshake-packets, but blocks the data-packets.
He th