Skip to content

Commit

Permalink
Update src/faq.md
Browse files Browse the repository at this point in the history
Co-authored-by: dan <[email protected]>
  • Loading branch information
sinui0 and themighty1 authored Dec 2, 2024
1 parent 402e31d commit 246ba50
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion src/faq.md
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ The TLSNotary protocol overcomes this limitation by making the third-party `Veri
One may wonder why the `Prover` can not simply generate a proof of the TLS connection locally without the help of another party.

This is not possible because of the way TLS is designed. Specifically, TLS utilizes symmetric-key cryptography with message authentication codes (MACs). As a consequence the TLS client, i.e. the `Prover`,
knows the secret key the `Server` uses to authenticate data and can trivially generate fake transcripts locally. Introducing another party into the connection mitigates this problem.
knows the secret key the `Server` uses to authenticate data and can trivially generate fake transcripts locally. Introducing another party into the connection mitigates this problem by removing unilateral access to the secret key from the `Prover`.

### How exactly does a Verifier participate in the TLS connection? { #faq3 }

Expand Down

0 comments on commit 246ba50

Please sign in to comment.