secure sign & encrypt
Adrian 'Dagurashibanipal' von Bidder
avbidder@fortytwo.ch
Tue May 21 10:24:02 2002
--=-qlPInynfxfswG9+89RgT
Content-Type: text/plain
Content-Transfer-Encoding: quoted-printable
On Fri, 2002-05-17 at 18:38, Robert J. Hansen wrote:
> Davis' `exploit' (in 1.1) basically boils down to this: if you can't trus=
t=20
> the person you're talking to, then the person you're talking to can use=20
> your words in ways you don't like. Is that a problem? Sure. But it's a=
=20
> social problem, not a technological one. It demands social solutions, no=
t=20
> different cryptographic standards.
Agreed that the exploit is not really technological. The programs do
exactly as told. From the senders point of view I agree fully to what
you say. BUT if somebody receives an encrypted message he will almost
always automatically assume secure end to end communication - which may
not be the case. The open question is basically if the user should be
educated that the software does not work the way they think (hard, I
think), or if the software should be modified to match the users
(reasonable, imho) expectations.
--=20
secure email with gpg avbidder@fortytwo.ch: key id
0x92082481
avbidder@acter.ch: key id
0x5E4B731F
--=-qlPInynfxfswG9+89RgT
Content-Type: application/pgp-signature; name=signature.asc
Content-Description: This is a digitally signed message part
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)
iD8DBQA86gRkwj49sl5Lcx8RApkTAJwKz0M8/q3Mdmdq0ngygNQG9lufTACgkISh
l9dTJC2VTYbGUjjoc4NXVWE=
=oE4v
-----END PGP SIGNATURE-----
--=-qlPInynfxfswG9+89RgT--