First page Back Continue Last page Summary Graphic
1. Flood the PKI
Flood the PKI with fictitious user IDs and names.
The net effect is that any typo gets the user one of your pre-positioned keys.
You then decrypt their messages and forward them encrypted to the intended recipient, with an altered return address.
Notes: