That would depend on the protocol (and could be easily tested if I was
not lazy). If the client will use the key only if required, the attack
could still be successful in encrypted networks.


-- 
mvordeme

Squeezebox Duet | 'Last.fm' (http://www.last.fm/user/mvordeme)
------------------------------------------------------------------------
mvordeme's Profile: http://forums.slimdevices.com/member.php?userid=22892
View this thread: http://forums.slimdevices.com/showthread.php?t=29499

_______________________________________________
discuss mailing list
[email protected]
http://lists.slimdevices.com/lists/listinfo/discuss

Reply via email to