Shared Half-Secret

J

James Gray

I have a program A (totally private) that talks to a program B (open
source). I would like to introduce some way to ensure B only listens
to the real A to avoid things like man-in-the-middle attacks.

Any good ideas about how I might accomplish this? Thanks.

James Edward Gray II
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Members online

No members online now.

Forum statistics

Threads
474,175
Messages
2,570,944
Members
47,491
Latest member
mohitk

Latest Threads

Top