On 09/05/13 22:42, FA - ML wrote: > On Thu, Sep 05, 2013 at 04:50:32PM +0200, Guido Witmond wrote: >> I've written two new blog entries on eccentric authentication. > > They are interesting articles and I bookmarked them to read them when I am > not commuting. I am quite interestedin cryptography and identity problems.
Glad you like them. :-) > > One initial question, while I "digest" both articles: in "The Holy Grail of > Cryptography" article, section "Authenticating relatives", you write: > >> (There is a small chance that you might get tricked by a Man in the >> Middle-attack. You have to do a little more work than just described, >> but that’s easy.) > > Can you explain/point me to a resource where those steps (to avoid the > mitm attack) are described? > That would be in the manual of the voice/video/chat package. Usually it means validating a SAS (Short Authentication String) once. regards, Guido.
signature.asc
Description: OpenPGP digital signature
