How do I catch a Man in the Middle?

A “Man in the middle attack,” depends on controlling the exchange between the sender and receiver. The principle is to intercept the “sent” message. Read it (and or modify it,) then pass it on to the receiver, without making him or her aware of the substitution.

This procedure is open to various failings. One possibility is for the receiver to discover discrepancies in the message during face to face review with the sender. This might be the gold standard, since it is impossible to counterfeit.

However, if the sender and receiver creatively record the time, it would become possible to observe that the message lingered too long in transit. This might be more practical for couriers, than for computer bits, because of the vanishingly small time frames. However, atomic clocks delineate time very precisely.


About James Johnson

I am an amateur mathematician & political theorist who enjoys (occasionally cerebral) humor.
Aside | This entry was posted in Uncategorized and tagged , , , . Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s