Clarify BRP Attack Vector
Compare changes
+ 1
− 1
@@ -22,7 +22,7 @@ Before they can connect, the peers need to know how to contact each other. A str
Do we assume or not assume that the public keys were exchanged through a secure channel? The following sentence seems to imply the former.