Open dbosk opened 5 years ago
This would be details on crypto protocols for authentication. Basically, we can reduce much of user-machine and machine-user to machine-machine due to the user using e.g. a smartphone.
This should include #21: Add authenticated-key exchange and authenticated key-exchange.
From #6: Machine-to-machine might also be covered by keyauth.
This would be details on crypto protocols for authentication. Basically, we can reduce much of user-machine and machine-user to machine-machine due to the user using e.g. a smartphone.