• Lena@gregtech.eu
    link
    fedilink
    English
    arrow-up
    0
    ·
    20 days ago

    You could intercept their communications and replace the public key one sends with your own, and when the other tries to send a message to the first (to your public key instead of the cat’s) you get access to the message’s contents and then reencrypt it to the correct public key.