On Thu, Apr 28, 2022 at 09:30:21AM -0400, Bill Cole wrote: > > and the impersonation attacks that it enables would be extremely > complicated to mount, so may be entirely theoretical.
Of course it is. It's probably thousand times more likely that a mirror itself is hacked and it's files replaced. But don't you love to see a warm and fuzzy secure lock on your connection?
