>more specifically... If attacker succeeds in the above, every app that wants 
>to use  the same library version is compromised by that browser cache even 
>after leaving the 'man-in-the-middle' compromised network.

I am not going to hold my breath on this, but the way to avoid this would be to 
have adobe host a minimal-sized, signed rsl, that contained our hashes. Then we 
have the hashes with a level of confidence.

Mike

Reply via email to