CryptoFly.us | CRYPTOCURRENCY BITCOIN SHIRTS CLOTHING APPAREL HATS

CRYPTO NEWS

Privacy-focused altcoins soar after Bitcoin’s ETF news sparks a market-wide rally

Altcoin projects focused on privacy caught a bid today as the bullish sentiment building over a possible Bitcoin ETF approval spreads across the market.

Proof that exchanged variable was not modified with MITM

If I understand correctly, the core of man in the middle attack is in being able to replace an exchanged variable (public key) with another. Hence to detect a MITM one needs to check if the exchanged public key is truly same for both A and B, and to defend against MITM one needs to::Listen

If I understand correctly, the core of man in the middle attack is in being able to replace an exchanged variable (public key) with another.

Hence to detect a MITM one needs to check if the exchanged public key is truly same for both A and B, and to defend against MITM one needs to be able to exchange a variable without it being modified.

I’d imagine it should be possible to detect a change in variable by using it to determine future information exchange rules (for example data order, or size of packets) for A and B, where next packet can only be sent once a response arrived. This way, the MITM would be forced to create (believable)replies to allow data exchange to continue. The MITM naturally desires to gather information from the exchange, and hence does not know the best possible replies. Also, as communication progresses, the divergence in exchanged information grows and hence becomes more visible (not sure how? Sanity checks?). This way it should be possible to detect MITM.

Am I correct or is there a flaw in my reasoning?

Privacy-focused altcoins soar after Bitcoin’s ETF news sparks a market-wide rally

Shopping cart
There are no products in the cart!
Continue shopping
0