Skip to content

Clarify BRP Attack Vector

Do we assume or not assume that the public keys were exchanged through a secure channel? The following sentence seems to imply the former.

Edited by Thomas

Merge request reports

Loading