attacker can profit from being able to provide two addresses thatI'm calling it weird because I'm not sure how an
correspond to the same key, but I can probably come up with a few
scenarios if I think about it.
_______________________________________________ tor-dev mailing list tor-dev@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev