First page Back Continue Last page Summary Graphic
1. Flood the PKI
- Flood the PKI with fictitious user IDs and names.
- The net effect is that any typo gets the user one of your pre-positioned keys.
- You then decrypt their messages and forward them encrypted to the intended recipient, with an altered return address.
Notes: