The issue of defeating the MITM scenario has been beat to death with plenty of information readily available using simple google searches
Enlighten us with some keywords, then. The
resource I posted a few pages back claims that all existing methods are vulnerable to MITM. I haven't seen any dead horses in my searches. I can barely find any information on blowcrypt implementations at all.