aeris22’s avataraeris22’s Twitter Archive—№ 61,382

    1. …in reply to @Galaxkey
      @Galaxkey @pwnsdx @d4v3nu11 @zackwhittaker Even with public key, you can do mitm. Because users have no way to ensure the public key they fetch are the real public key of the other participant and not a fake public key you own the private part.
  1. …in reply to @aeris22
    @Galaxkey @pwnsdx @d4v3nu11 @zackwhittaker (And if they have a way to ensure the public key ownership, so without using feature of your own, you are just totally useless…)