• Lena@gregtech.eu
        link
        fedilink
        English
        arrow-up
        0
        ·
        17 days ago

        You could intercept their communications and replace the public key one sends with your own, and when the other tries to send a message to the first (to your public key instead of the cat’s) you get access to the message’s contents and then reencrypt it to the correct public key.