Repository : ssh://git@diktynna/doc On branches: backup-redmine,main
commit 46f3016bb7b82ceaad74bd5c8e6dbfd49b0e9da2 Author: Linus Lüssing linus.luessing@c0d3.blue Date: Mon Jul 8 14:29:56 2024 +0000
doc: open-mesh/OpenHarbors
46f3016bb7b82ceaad74bd5c8e6dbfd49b0e9da2 open-mesh/OpenHarbors.textile | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/open-mesh/OpenHarbors.textile b/open-mesh/OpenHarbors.textile index efd38343..a4771f68 100644 --- a/open-mesh/OpenHarbors.textile +++ b/open-mesh/OpenHarbors.textile @@ -94,7 +94,7 @@ h3. Solution # Like in scenario A), move the authenticator from the AP into the server room # Client device will have encrypted communication into the server room, AP + wire becomes part of the untrusted medium # No potential to Man-in-the-Middle from outside the server room -# Attacker now *needs a physical key* to the server room to get the sensitive data +# Attacker now *needs a physical key* to the server room to get the sensitive data (or access to the client device)
h2. (Additional) Use-cases & Benefits