On Thu, Jun 09, 2016 at 01:24:09AM +0000, Gregory Maxwell wrote: > Reduction to plaintext isn't an interesting attack vector for an active > attacker: they can simply impersonate the remote side. > > This is addressed via authentication, where available, which is done by a > separate specification that builds on this one.
Are there any links to discussions on how authentication may be done? Thanks, Alfie -- Alfie John https://www.alfie.wtf _______________________________________________ bitcoin-dev mailing list [email protected] https://lists.linuxfoundation.org/mailman/listinfo/bitcoin-dev
