Follow-up Comment #3, sr #110907 (project administration):

Let us imagine that the message with the hash is intercepted; then it would be
possible for the interceptor to impersonate that user in that tracker item,
wouldn't it?


    _______________________________________________________

Reply to this item at:

  <https://savannah.nongnu.org/support/?110907>

_______________________________________________
Message sent via Savannah
https://savannah.nongnu.org/


Reply via email to