Follow-up Comment #3, sr #110907 (project administration): Let us imagine that the message with the hash is intercepted; then it would be possible for the interceptor to impersonate that user in that tracker item, wouldn't it?
_______________________________________________________ Reply to this item at: <https://savannah.nongnu.org/support/?110907> _______________________________________________ Message sent via Savannah https://savannah.nongnu.org/