File: comment_1_128809c5a2a9f5cc345a10fdbf55be01._comment

package info (click to toggle)
git-annex 5.20141125
  • links: PTS
  • area: main
  • in suites: jessie, jessie-kfreebsd
  • size: 37,828 kB
  • ctags: 583
  • sloc: haskell: 42,582; sh: 1,080; ansic: 498; makefile: 316; perl: 125
file content (8 lines) | stat: -rw-r--r-- 468 bytes parent folder | download | duplicates (11)
1
2
3
4
5
6
7
8
[[!comment format=mdwn
 username="https://www.google.com/accounts/o8/id?id=AItOawlJ2utMQgMEYAOs3Dfc6eZRyUzt4acNXUU"
 nickname="David"
 subject="comment 1"
 date="2013-06-10T23:42:20Z"
 content="""
If you do a D-H key exchange and display the key fingerprint on both devices, that would be a pretty strong disincentive against XMPP servers doing a MitM. You only need one victim to casually notice a discrepancy, and it leaves behind a strong proof of tampering.
"""]]