[Cryptography] Encryption opinion

James A. Donald jamesd at echeque.com
Tue Aug 26 05:57:02 EDT 2014


On 2014-08-26 13:49, Christian Huitema wrote:
> That particular deception is just one of the phishing techniques, in which
> Alice is, for example, tricked into contacting "bankofamerikka.com" and give
> out her Bank of America credentials. But the actual phishing techniques are
> way more diversified. Phishers might just point the user to a web site that
> they own, using social engineering to have the target overlook the URL. They
> might be hacking some legitimate web site and plant a bug there. They might
> just send an email attachment from a previously pwned account that the
> target trusts. The technology may well ensure that Alice is indeed speaking
> to the intended site, and yet phishing will still happen.

These all involve Alice communicating with Mallory when she thinks she 
is communicating with Bob, and then Mallory communicates with Bob 
pretending to be Alice.

Mallory is still in the middle.




More information about the cryptography mailing list