There are no crypto protocol that can avoid leaking either the initiator or the responder identity to a MITM. TLS leaks to passive attackers, but I don't think an active attack prerequisite would deter these regimes. Political problems cannot be solved with tech.
-
-
-
How would the active attack work in practice? Once you MITM, the connection won't validate on the client, so it can't be used as a way to decide which connections to censor.
- 1 more reply
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.