From 1c9ee8d28b3d911bcc67a0b497a0fcdc745d930f Mon Sep 17 00:00:00 2001 From: Michael Savage Date: Tue, 21 Nov 2017 23:44:44 +0200 Subject: [PATCH] Reword CRIME sentence --- doc/man/man3/intro.3monocypher | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/doc/man/man3/intro.3monocypher b/doc/man/man3/intro.3monocypher index df4dc0e..fd23c26 100644 --- a/doc/man/man3/intro.3monocypher +++ b/doc/man/man3/intro.3monocypher @@ -183,8 +183,9 @@ Most compression algorithms work by using fewer bytes to encode previously seen data or common characters. If an attacker can add data to the input before it is compressed and encrypted, they can observe changes to the ciphertext length to recover -secrets from the input, as demonstrated by researchers in the CRIME -attack against HTTPS. +secrets from the input. +Researchers have demonstrated an attack on HTTPS to steal session cookies when +compression is enabled, dubbed "CRIME". .Ss Forward secrecy Long term secrets cannot be expected to stay safe indefinitely. Users may reveal them by mistake, or the host computer might have a -- 2.47.3