➢ The objective is to be passively observe, out of band and not to be a
MitM or modify/inject text. Just as we all do today.
That might be the objective, but isn’t Ben correct? If a third-party has the
session keys, what prevents them from doing that? Good behavior? Or is there
some technical means (unclear to me) to actually prevent it?
As I used to read in the comics of my youth,
https://www.urbandictionary.com/define.php?term=good%20lord%21%20choke I am
glad that this conversation thread kept going, like a zombie it keeps rising.
We know have enough knowledge to definitively put a stake through its heart,
forever.
_______________________________________________
TLS mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/tls