I meant the bullet thing only to say like, don’t feel you have to go in depth, I just want to know which points to consider when I study them a bit more (too deep will be wasted effort at this time). I thought they were theoretically sound.

Interesting points. Thanks for summarizing them, will have to learn a bit more on the decoy thing but now I know to keep an eye out for it.

Reply to this note

Please Login to reply.

Discussion

Oh, and from what you pointed out, seems they are theoretically sound, and it’s more pragmatic vulnerabilities, as is always the case I suppose

AzIZ

Oz

always 👍

the vulnerablility is usually in the intersection of theory and actual usage

or in implementation