SHA1 being used despite public key preferences

smu johnson smujohnson at gmail.com
Thu Oct 21 11:16:11 CEST 2010


On Wed, Oct 20, 2010 at 6:50 PM, Robert J. Hansen <rjh at sixdemonbag.org>wrote:


> The problem comes from saying, "well, Bruce says…".
>
> A good argument stands on its own legs: it doesn't rely on any external
> authority for its soundness.  A lot of people in the crypto community are
> extraordinarily sensitive to what's called "appeal to authority" — since
> this one person says so, it must be so.  It's far better to give an argument
> that stands on its own, rather than appeal to "it's what Bruce says."
>
>
Two things.  First, "Bruce says.." was meant to be sort of like a
bibliography, when you try to find experts in the field who have said the
same things you are saying.  Usually it's good to give a bit of evidence for
some of the arguments you are making.  It is at least a better argument than
me writing to the list without anything to back it up.  So, I quoted some
stuff Bruce said.  Would you go around telling people who have citations in
bibliographic form that "A good argument stands on its own legs: it doesn't
rely on any external authority for its soundness."?

Second thing:  I already gave a good argument.  Let's forget what Bruce
said.  And forget that I gave him as source.   Let's go back to the basic
message:  SHA-1 is broken.  It has been public knowledge for 5 years, and 2
years ago, a better attack was published.  That is the basis for this whole
thread, more or less. Ignore everything else I've said, except this one
thing: SHA-1 is broken.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: </pipermail/attachments/20101021/c36eecbb/attachment.htm>


More information about the Gnupg-devel mailing list