Tuesday, Tuesday, December 04, 2001, 10:02:25 PM, Eric Smith wrote: > On the internet, on the other hand, there are *trivial* attacks to > divert or eavesdrop on traffic that can be mounted from halfway
I wouldn't say that man in the middle attacks are "trivial" to set up, or that other methods are trivial really. Man in the middle is actually one of the most difficult to setup and have actually productive. You would probably have to be the end user's ISP to do it effectively. Are these valid arguments? Sure, but they aren't very strong ones really, not from a real world practical point of view. They tend to cover theoretical possibilities, which usually are quite remote in probability. -- Best regards, William X Walsh <[EMAIL PROTECTED]> -- Webcertificates.info SSL Certificates for resellers from $49ea
