Achim Kraus <achimkraus=40gmx....@dmarc.ietf.org> writes:

>> B and C are fighter jets, and A is their commander. B has been
>> compromised by the enemy. A tells B to self-destruct, but because B
>> mounted a misbinding attack, the command goes to C.
>
>As long as:
>[...]

But more importantly you also need to have:

- Fighter jets in combat use TLS to communicate.
- The other side has compromised one or more of your military aircraft.
- Your military aircraft have a self-destruct command controlled remotely via
  TLS rather than the pilot saying "Begin auto-destruct sequence,
  authorization Picard 4-7 Alpha Tango".

Peter.
_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to