• 12 Posts
  • 16 Comments
Joined 9 months ago
cake
Cake day: October 8th, 2023

help-circle






















  • If the computer of the Visitor is already compromised ! your simulation can stop there I think…

    My scenario assume that the visitor computer is not compromised.

    But let say his traffic get intercepted. Sure a hacker can send his PubKey (2) but in (3) the visitor (should) have already the PubKey of one (or few) verification server. So it should not be possible for an hacker to interfer with the communication (3) right ?