Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I think we're talking past each other a bit here.

If I were trying to phish someone, I wouldn't attack the public key crypto part, so how domains come into play during authentication doesn't matter. I'd just grab the "unencrypted" session token at the end of the exchange.

Even if you somehow protected the session token (sounds dubious), there's still plenty a phisher could do, since it has full MITM capability.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: