• Lena@gregtech.eu
          link
          fedilink
          English
          arrow-up
          0
          ·
          20 days ago

          You could intercept their communications and replace the public key one sends with your own, and when the other tries to send a message to the first (to your public key instead of the cat’s) you get access to the message’s contents and then reencrypt it to the correct public key.