Prevent MitM attack during key exchange
darioalessandro opened this issue · 0 comments
darioalessandro commented
The two peers exchange their public keys over the insecure channel. It is essential that they verify the integrity and authenticity of the received public key, as a Man-in-the-Middle (MitM) attacker could replace the keys with their own. This verification can be done using a trusted third party, digital signatures, or some other secure method.