On other words, while initially establishing trust is harder it is also harder for an attacker to execute an interception at that stage (mostly thanks to TLS). So this solution focuses on fending off the more common, more easily accomplished attack of stolen credentials from storage. Do I have that right?
Power management, mobile and firmware developer on Linux. Security developer at Aurora. Ex-biologist. mjg59 on Twitter. Content here should not be interpreted as the opinion of my employer. Also on Mastodon.
no subject
Date: 2022-05-17 01:49 pm (UTC)