top | item 24829800

(no title)

kwhat4 | 5 years ago

There is no common key in the MITM scenario. It's still securely encrypted using over the counter algorithms, but instead of the end users exchanging keys, you exchange with the MITM and different key sets are used by both parties.

discuss

order

lostcolony|5 years ago

Fair enough; logic still applies. A criminal element just needs to comprise the MITM to compromise all communication flowing through it.