Comment TLS hashes the key with nonce , wep was weak (Score 1) 277
> A relatively easy way to get all those samples is to inject a script into somebody's HTTP response - say, for http://slashdot.org/ - which constantly does nothing but request the same HTTPS URL
Not with a https url you're not going to do that. You're going to need to attack a protocol in which bytes from the master key are reused in each transaction. WEP was such a protocol, TLS isn't one. TLS rc4 hashes a nonce with the key each time, so the bits used as the rc4 key are different each time, making probabilistic attacks useless.
That's the "bits can't be reused in the xor" part of my post.
I've noticed a pattern with you. You're reasonably well informed regarding cryptography, and understand the concepts well (though you sometimes read too fast and miss the details). You therefore decide that ONLY you are informed and everyone else are idiots. Here's the thing. You've read a lot, but forget that everything you've read was written by someone other than you. You HEARD about an attack on a cipher. Great, so did everybody else. Somebody actually developed that attack. Somebody who is in the set "not you, therefore an idiot" developed the attack. You'd do well to actually read what others have to say rather than skipping what they said said because after all, anyone other than you is an idiot. (No, some of us actually created what you study).