this post was submitted on 07 Jun 2025
12 points (100.0% liked)

technology

23824 readers
2 users here now

On the road to fully automated luxury gay space communism.

Spreading Linux propaganda since 2020

Rules:

founded 4 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[โ€“] pcalau12i@lemmygrad.ml 1 points 1 week ago (1 children)

You are just straight-up not reading my posts.

[โ€“] yogthos@lemmygrad.ml 2 points 1 week ago

Ok sorry, I did misread you. You're talking about both parties exchanging the key with the attacker thinking the attacker is the other party. So yeah, you're right that you'd need some public key system for ensuring the identity of the node you're talking to.