Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Perhaps roaming makes some kind of man-in-the-middle attack possible?


The roaming thing occurs post negotiation, so the connection is already fully encrypted.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: