Closed GoogleCodeExporter closed 9 years ago
Need to review usage of protocol, keys for identifying parties, etc. Think through all aspects of protocol and come up with attacks.
Original issue reported on code.google.com by joelo...@gmail.com on 1 Nov 2012 at 6:42
joelo...@gmail.com
Original comment by joelo...@gmail.com on 6 Nov 2012 at 10:40
Original issue reported on code.google.com by
joelo...@gmail.com
on 1 Nov 2012 at 6:42