diff --git a/protocols/BRP.md b/protocols/BRP.md index 354557aba2d7f0c2fb6d89beb075b37fcd5b1909..93f5f86f7960afeed8d73191963ca08e1fd3aa18 100644 --- a/protocols/BRP.md +++ b/protocols/BRP.md @@ -22,7 +22,7 @@ Before they can connect, the peers need to know how to contact each other. A str We assume the adversary can read, modify, delete and insert traffic on all transports at will. -We do not assume that the peers exchanged their public keys over a secure channel. If the adversary intercepted the prior exchange of public keys and replaced them with its own public keys then BRP does not detect or prevent man-in-the-middle attacks. +Practically we should not assume that the peers exchanged their public keys over a secure channel. If the adversary intercepted the prior exchange of public keys and replaced them with its own public keys then BRP can not detect or prevent man-in-the-middle attacks. (Limitation) If the adversary knows both peers' public keys but did not replace them during the prior exchange then BRP prevents the adversary from learning the peers' network addresses, unless the adversary can see the addresses by observing the underlying transport.