Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU |
On Aug 5, 2010, at 8:25 PM, Bill Bogstad wrote: > > That still sounds like it is running on one of the end points > (client). In order to do that the end point has to have already been > compromised. That's very different from manipulating the > communications path between two secure end points. If you see the computer that the game client runs on as an end-point then yes, you are correct. If, however, you look at the game client as an end-point then it is an MitM attack. --Rich P.
BLU is a member of BostonUserGroups | |
We also thank MIT for the use of their facilities. |