<div dir="ltr"><p dir="ltr"><br>
On Oct 3, 2014 9:54 PM, "elijah" <<a href="mailto:elijah@riseup.net" target="_blank">elijah@riseup.net</a>> wrote:<br>
><br>
> On 10/03/2014 11:54 AM, Tao Effect wrote:<br>
> > On Oct 3, 2014, at 11:43 AM, elijah <<a href="mailto:elijah@riseup.net" target="_blank">elijah@riseup.net</a>><br>
><br>
> Your scenario, afaik, is an attacker who can mitm any and all network<br>
> connections and so can inject bad data in the gossip among monitors and<br>
> the connections between user-agents-auditors and monitors. To me, this<br>
> assumes that this global mitm attack has existed for all time, since<br>
> once a user agent or a monitor is able to initially bootstrap some<br>
> correctly authenticated secure connection with a monitor, they should be<br>
> able to detect subsequent mitm attempts from that point forward.<br><br>Agreed. The threat model assumed in Greg's blog post about CT isn't quite stated explicitly but it feels absurdly strong to the point of being a red herring.</p><p dir="ltr">
> So, let me ask:</p><p>I'd add a third question: in the threat model in which CT doesn't work, does a blockchain-based approach work? Can't a permanent MITM that a user doesn't have any secure channel to avoid also confuse that user into accepting an incorrect block chain?</p><p dir="ltr"><br>
</p>
</div>