<p dir="ltr">Hi Bruno,</p>
<p dir="ltr">On Oct 6, 2016 9:29 PM, "Bruno Wolff III" <<a href="mailto:bruno@wolff.to">bruno@wolff.to</a>> wrote:<br>
> Someone able to watch and modify traffic can wait for authentication to occur and then take over the connection. So you don't know you are still communicating with the party that did the authentication. You need something protecting message integrity which is normally based on encryption, but I think there might be ways to do that with just hashing.</p>
<p dir="ltr">You're misunderstanding terminology, I think. Rather than polluting this thread here, I'd be happy to explain to you on IRC -- I'm zx2c4 on freenode.</p>
<p dir="ltr">Jason</p>