top | item 43694589

(no title)

steventhedev | 10 months ago

There is a security model where MITM is not viable - and separating that specific threat from that of passive eavesdropping is incredibly useful.

discuss

order

tptacek|10 months ago

MITM scenarios are more common on the 2025 Internet than passive attacks are.

steventhedev|10 months ago

MITM attacks are common, but noisy - BGP hijacks are literally public to the internet by their nature. I believe that insisting on coupling confidentiality to authenticity is counterproductive and prevents the development of more sophisticated security models and network design.

BobbyJo|10 months ago

What does their commonality have to do with the use cases where they aren't viable?