On Feb 2, 2005, at 10:20 PM, [EMAIL PROTECTED] wrote:

We are still vulnerable to man-in-the-middle attack.

To my knowledge, so long as we insist on the use case consisting of using an untrusted third-party machine on an untrusted third-party network to access a trusted system, we are vulnerable to any number of man-in-the-middle attacks.

Gregory

--
Gregory K. Ruiz-Ade <[EMAIL PROTECTED]>
OpenPGP Key ID: EAF4844B  keyserver: pgpkeys.mit.edu

Attachment: PGP.sig
Description: This is a digitally signed message part

-- 

KPLUG-List mailing list
[email protected]
http://www.kernel-panic.org/cgi-bin/mailman/listinfo/kplug-list

Reply via email to