> On May 11, 2016, at 10:00 AM, Arnis <ar...@ut.ee> wrote:
> 
> The work shows that although the design of TorChat is sound, its 
> implementation has several flaws, which make TorChat users vulnerable to 
> impersonation

The impersonation vulnerability mentioned here is inherent; it requires 
compromising the victims system to steal their private key, or using 
brute-force.

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Reply via email to