Achim Kraus <achimkraus=40gmx....@dmarc.ietf.org> writes: >> B and C are fighter jets, and A is their commander. B has been >> compromised by the enemy. A tells B to self-destruct, but because B >> mounted a misbinding attack, the command goes to C. > >As long as: >[...]
But more importantly you also need to have: - Fighter jets in combat use TLS to communicate. - The other side has compromised one or more of your military aircraft. - Your military aircraft have a self-destruct command controlled remotely via TLS rather than the pilot saying "Begin auto-destruct sequence, authorization Picard 4-7 Alpha Tango". Peter. _______________________________________________ TLS mailing list -- tls@ietf.org To unsubscribe send an email to tls-le...@ietf.org