key-signing for pseudonyms
Chris Fox
dissectingtable at comast.net
Sun May 16 22:51:40 CEST 2004
Atom 'Smasher' wrote:
> >If you don't have a copy, you should get one, and the discussion you'd
> >find most useful is in chapter 22.
>
> >http://www.amazon.com/exec/obidos/tg/detail/-/0471117099/qid=1084694789/sr=1-1/ref=sr_1_1__i1_xgl14/102-5881488-5636902?v=glance&s=books
>
> =========================
>
> ah, yes... secure key exchange algorithms....
>
> of course, i guess one secure way to do it is a DH key exchange over
> email, and then the result can be verified in person... or are you
> suggesting something that doesn't require a calculator?
>
> i'll re-read through it tonight. are there any particular parts in
> particular that apply to our thread? the problem remains a social problem,
> not a computer problem.
Gotcha. Well, as long as it's only a case of simple personal
authentication and not the evasion of a major government's dedicated
intrusion attempts, I'd say do the confirmation over the telephone. You
can do PK key exchange through public channels and verify authenticity
with a phone call. It's not like ordinary individuals have networks of
spies and spoofing servers at hand.
> "[The] feminist agenda is not about equal rights for women.
> It is about a socialist, anti-family political movement that
> encourages women to leave their husbands, kill their
> children, practice witchcraft, destroy capitalism and become
> lesbians."
> -- Rev. Pat Robertson, 1992
And this guy still has an audience!
_______________________________________________
Gnupg-users mailing list
Gnupg-users at gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
More information about the Gnupg-users
mailing list