@bascule I'd say once you can convince others you're someone else, you can harvest whatever's necessary to spy on that someone later.
-
-
-
@justintroutman how would you do a passive attack on ECDHE if you had the server's private key?
End of conversation
New conversation -
-
-
@bascule That's the theory. I'll talk about the practice in my talk at BlackHat next week... https://www.blackhat.com/us-13/briefings.html#NextGen …#BlackHat#PFS#Fail -
@nextgens1 Looking for the tools you presented at BH2013, will they be making it to your github soon? Great talk, too many people missed it!
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.