it became an essay 🫣

Reply to this note

Please Login to reply.

Discussion

I meant the bullet thing only to say like, don’t feel you have to go in depth, I just want to know which points to consider when I study them a bit more (too deep will be wasted effort at this time). I thought they were theoretically sound.

Interesting points. Thanks for summarizing them, will have to learn a bit more on the decoy thing but now I know to keep an eye out for it.

Oh, and from what you pointed out, seems they are theoretically sound, and it’s more pragmatic vulnerabilities, as is always the case I suppose

AzIZ

Oz

always 👍

the vulnerablility is usually in the intersection of theory and actual usage

or in implementation