From: Michael Savage Date: Tue, 21 Nov 2017 21:44:44 +0000 (+0200) Subject: Reword CRIME sentence X-Git-Url: https://git.codecow.com/?a=commitdiff_plain;h=1c9ee8d28b3d911bcc67a0b497a0fcdc745d930f;p=Monocypher.git Reword CRIME sentence --- diff --git a/doc/man/man3/intro.3monocypher b/doc/man/man3/intro.3monocypher index df4dc0e..fd23c26 100644 --- a/doc/man/man3/intro.3monocypher +++ b/doc/man/man3/intro.3monocypher @@ -183,8 +183,9 @@ Most compression algorithms work by using fewer bytes to encode previously seen data or common characters. If an attacker can add data to the input before it is compressed and encrypted, they can observe changes to the ciphertext length to recover -secrets from the input, as demonstrated by researchers in the CRIME -attack against HTTPS. +secrets from the input. +Researchers have demonstrated an attack on HTTPS to steal session cookies when +compression is enabled, dubbed "CRIME". .Ss Forward secrecy Long term secrets cannot be expected to stay safe indefinitely. Users may reveal them by mistake, or the host computer might have a