On Thu, Apr 28, 2022 at 09:30:21AM -0400, Bill Cole wrote:
> 
> and the impersonation attacks that it enables would be extremely
> complicated to mount, so may be entirely theoretical.

Of course it is.  It's probably thousand times more likely that a mirror
itself is hacked and it's files replaced.  But don't you love to see a warm
and fuzzy secure lock on your connection?

Reply via email to