> On May 11, 2016, at 10:00 AM, Arnis <ar...@ut.ee> wrote: > > The work shows that although the design of TorChat is sound, its > implementation has several flaws, which make TorChat users vulnerable to > impersonation
The impersonation vulnerability mentioned here is inherent; it requires compromising the victims system to steal their private key, or using brute-force. -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk