On Feb 2, 2005, at 10:20 PM, [EMAIL PROTECTED] wrote:
We are still vulnerable to man-in-the-middle attack.
To my knowledge, so long as we insist on the use case consisting of using an untrusted third-party machine on an untrusted third-party network to access a trusted system, we are vulnerable to any number of man-in-the-middle attacks.
Gregory
-- Gregory K. Ruiz-Ade <[EMAIL PROTECTED]> OpenPGP Key ID: EAF4844B keyserver: pgpkeys.mit.edu
PGP.sig
Description: This is a digitally signed message part
--
KPLUG-List mailing list [email protected] http://www.kernel-panic.org/cgi-bin/mailman/listinfo/kplug-list
