Tuesday, Tuesday, December 04, 2001, 10:02:25 PM, Eric Smith wrote:

> On the internet, on the other hand, there are *trivial* attacks to
> divert or eavesdrop on traffic that can be mounted from halfway

I wouldn't say that man in the middle attacks are "trivial" to set up,
or that other methods are trivial really.

Man in the middle is actually one of the most difficult to setup and
have actually productive.   You would probably have to be the end
user's ISP to do it effectively.

Are these valid arguments?  Sure, but they aren't very strong ones
really, not from a real world practical point of view. They tend to
cover theoretical possibilities, which usually are quite remote in
probability.

-- 
Best regards,
William X Walsh <[EMAIL PROTECTED]>
--
Webcertificates.info
SSL Certificates for resellers from $49ea

Reply via email to