On Fri, Aug 06, 2010 at 10:39:44AM -0400, Richard Pieri wrote: > On Aug 5, 2010, at 8:25 PM, Bill Bogstad wrote: > > > > That still sounds like it is running on one of the end points > > (client). In order to do that the end point has to have already been > > compromised. That's very different from manipulating the > > communications path between two secure end points. > > If you see the computer that the game client runs on as an end-point > then yes, you are correct. If, however, you look at the game > client as an end-point then it is an MitM attack. It's still not a MITM, because even if you consider the game client the end point, then it's the endpoint itself that's been compromised. What you have is a trojan, plain and simple. -- Derek D. Martin http://www.pizzashack.org/ GPG Key ID: 0xDFBEAD02 -=-=-=-=- This message is posted from an invalid address. Replying to it will result in undeliverable mail due to spam prevention. Sorry for the inconvenience.