Alfie John [ARCHIVE] on Nostr: 📅 Original date posted:2016-06-08 📝 Original message:On Thu, Jun 09, 2016 at ...
📅 Original date posted:2016-06-08
📝 Original message:On Thu, Jun 09, 2016 at 01:24:09AM +0000, Gregory Maxwell wrote:
> Reduction to plaintext isn't an interesting attack vector for an active
> attacker: they can simply impersonate the remote side.
>
> This is addressed via authentication, where available, which is done by a
> separate specification that builds on this one.
Are there any links to discussions on how authentication may be done?
Thanks,
Alfie
--
Alfie John
https://www.alfie.wtf
📝 Original message:On Thu, Jun 09, 2016 at 01:24:09AM +0000, Gregory Maxwell wrote:
> Reduction to plaintext isn't an interesting attack vector for an active
> attacker: they can simply impersonate the remote side.
>
> This is addressed via authentication, where available, which is done by a
> separate specification that builds on this one.
Are there any links to discussions on how authentication may be done?
Thanks,
Alfie
--
Alfie John
https://www.alfie.wtf