Originally Posted By: beer
The issue of defeating the MITM scenario has been beat to death with plenty of information readily available using simple google searches


Enlighten us with some keywords, then. The resource I posted a few pages back claims that all existing methods are vulnerable to MITM. I haven't seen any dead horses in my searches. I can barely find any information on blowcrypt implementations at all.


- argv[0] on EFnet #mIRC
- "Life is a pointer to an integer without a cast"