J
James Gray
I have a program A (totally private) that talks to a program B (open
source). I would like to introduce some way to ensure B only listens
to the real A to avoid things like man-in-the-middle attacks.
Any good ideas about how I might accomplish this? Thanks.
James Edward Gray II
source). I would like to introduce some way to ensure B only listens
to the real A to avoid things like man-in-the-middle attacks.
Any good ideas about how I might accomplish this? Thanks.
James Edward Gray II