-
@Galaxkey @d4v3nu11 @pwnsdx @zackwhittaker Even if you don't handle those keys, you are always in position of mitm for « document exchange » for example.
-
@Galaxkey @d4v3nu11 @pwnsdx @zackwhittaker A wants to send to B. So A needs to trust B key, to decrypt document with it Ka key and then encrypt for the Kb key and then send it over unsecure network.
-
@Galaxkey @d4v3nu11 @pwnsdx @zackwhittaker To allow A to have Kb, if you are the trusted peer, you already can send Kc YOU CONTROL to A, A will send you encrypted document you can decrypt. Your system is doomed.
-
@Galaxkey @d4v3nu11 @pwnsdx @zackwhittaker If you are not the trusted peer, so A and B need a trustable vector, and so you are… totaly useless ? 😂
aeris22’s Twitter Archive—№ 61,364