On Thu, Sep 05, 2013 at 04:50:32PM +0200, Guido Witmond wrote:
> I've written two new blog entries on eccentric authentication.

They are interesting articles and I bookmarked them to read them when I am
not commuting. I am quite interestedin cryptography and identity problems.

One initial question, while I "digest" both articles: in "The Holy Grail of
Cryptography" article, section "Authenticating relatives", you write:

> (There is a small chance that you might get tricked by a Man in the
> Middle-attack. You have to do a little more work than just described,
> but that’s easy.)

Can you explain/point me to a resource where those steps (to avoid the
mitm attack) are described?

Reply via email to