TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Opportunistic encryption and authentication methods

35 点作者 frrp超过 10 年前

2 条评论

vilhelm_s超过 10 年前
I wonder how much<p>&gt; A small number of users performing &quot;stealthy&quot; authentication could protect other users by creating uncertainty about which connections can be undetectably attacked<p>is worth in our post-Snowden world. We already know that the governments of the US, China, Syria, etc, are carrying out pervasive surveillance. They could just start doing MITM attacks against _every_ connection, and we&#x27;d be in the same situation as we were before implementing opportunistic encryption?
评论 #8312988 未加载
评论 #8312925 未加载
评论 #8313533 未加载
mSparks超过 10 年前
Wouldn&#x27;t protect against passive eavesdropping though would it? They&#x27;d just mim everything
评论 #8313064 未加载
评论 #8312087 未加载