That would depend on the protocol (and could be easily tested if I was not lazy). If the client will use the key only if required, the attack could still be successful in encrypted networks.
-- mvordeme Squeezebox Duet | 'Last.fm' (http://www.last.fm/user/mvordeme) ------------------------------------------------------------------------ mvordeme's Profile: http://forums.slimdevices.com/member.php?userid=22892 View this thread: http://forums.slimdevices.com/showthread.php?t=29499 _______________________________________________ discuss mailing list [email protected] http://lists.slimdevices.com/lists/listinfo/discuss
