|This is the talk page for discussing improvements to the Man-in-the-middle attack article.
This is not a forum for general discussion of the article's subject.
|Archives: 1Auto-archiving period: 90 days|
|This article is of interest to the following WikiProjects:|
|This article was the subject of a Wiki Education Foundation-supported course assignment, between 25 January 2021 and 16 May 2021. Further details are available on the course page. Student editor(s): Drew Carver1.|
public key is?
It won't be clear until i know what a public-key is. Kingturtle 02:42 Apr 16, 2003 (UTC)
I answered my own question by wikifying public key. It seems to me that there are many instances in the natural world in which this strategy works. Don't some viruses operate this way? Or some insects or fish? Kingturtle 02:45 Apr 16, 2003 (UTC)
Biometrics are no more secure, deleted...
Most biometrics don't change; if they do, a secure-channel transfer must be made...since they are unchanging, they don't add any extra authentication security. They can just be relayed along as-is. It is generally impractical to do more than one secure channel transfer, so real-time biometrics are out. The only example I can think of that works is voice, but that is unreliable, easy to fool in only a few tries, and would rely on strings of randomly chosen words. Also, if your voice is hoarse, etc., it will lock you out. Eyes don't change, fingerprints don't change, etc. --Pokeme444 22:11, Mar 20 2010 (UTC)
One-time pads are invulnerable to MITM, assuming the security of the one-time pad. In fact, the data can be translated in plaintext if you trust the pad. 22:11, Mar 20 2010 (UTC)
http://res1.windows.microsoft.com/resbox/en/windows/main/a7faf27c-2c92-4f71-aa9a-6f8f5b2c561b_18.pngCite error: There are
<ref> tags on this page without content in them (see the help page).
This term pre-dates computers// This term's fundamental mechanism (a central agent manipulating communication between two otherwise non-communicating parties) was represented in songs by ABBA and David Bowie in 70's and 80's respectively. So - this concept and terminology was out there and would best be associated for accuracy - for example - https://en.wikipedia.org/wiki/Man_in_the_middle. My interest here is whether the essential "man-in-the-middle" concept should be (and was) regarded as a more general term. What other term describes this basic and ancient mechanism for fraud, etc.? — Preceding unsigned comment added by Wikibearwithme (talk • contribs) 22:16, 9 August 2021 (UTC)