On 05/11/2016 05:09 PM, moosehad...@gmail.com wrote:
On May 11, 2016, at 10:00 AM, Arnis <ar...@ut.ee> wrote:
The work shows that although the design of TorChat is sound, its implementation
has several flaws, which make TorChat users vulnerable to impersonation
The impersonation vulnerability mentioned here is inherent; it requires
compromising the victims system to steal their private key, or using
brute-force.
Check section "7 Summary of Findings" (page 45).
There are at least two impersonation flaws, none of which require to
steal private key.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk