Comment Re:until someone hacks it (Score 1) 216
I do information security for a living. [...]
So do I.
Pulling off an effective MITM assumes that the ends aren't doing effective mutual validation. Now, that's true much, much more often than it should be, but jumping from "most people do X badly" to "Y's effort to implement X is doomed to failure" isn't exactly a reasonable position when X doesn't violate any theoretical constraints (as so many attempted products do -- "X must have a key to decrypt Y, but must not be able to copy Y", etc).