Comment by mcpherrinm
5 months ago
well, unless both client and server have sufficiently weak crypto enabled that an attacker can break it during the handshake.
Then you can MITM, force both sides to use the weak crypto, which can be broken, and you're in the middle. Also not really so relevant today.
No comments yet
Contribute on Hacker News ↗