File: comment_1_128809c5a2a9f5cc345a10fdbf55be01._comment

package info (click to toggle)
git-annex 5.20141125%2Bdeb8u1
  • links: PTS
  • area: main
  • in suites: jessie
  • size: 37,832 kB
  • sloc: haskell: 42,603; sh: 1,080; ansic: 498; makefile: 316; perl: 125
file content (8 lines) | stat: -rw-r--r-- 468 bytes parent folder | download | duplicates (11)
1
2
3
4
5
6
7
8
[[!comment format=mdwn
 username="https://www.google.com/accounts/o8/id?id=AItOawlJ2utMQgMEYAOs3Dfc6eZRyUzt4acNXUU"
 nickname="David"
 subject="comment 1"
 date="2013-06-10T23:42:20Z"
 content="""
If you do a D-H key exchange and display the key fingerprint on both devices, that would be a pretty strong disincentive against XMPP servers doing a MitM. You only need one victim to casually notice a discrepancy, and it leaves behind a strong proof of tampering.
"""]]