key-signing for pseudonyms

Chris Fox dissectingtable at comast.net
Sun May 16 22:51:40 CEST 2004


Atom 'Smasher' wrote:

> >If you don't have a copy, you should get one, and the discussion you'd
> >find most useful is in chapter 22.
>
> >http://www.amazon.com/exec/obidos/tg/detail/-/0471117099/qid=1084694789/sr=1-1/ref=sr_1_1__i1_xgl14/102-5881488-5636902?v=glance&s=books
>
> =========================
>
> ah, yes... secure key exchange algorithms....
>
> of course, i guess one secure way to do it is a DH key exchange over
> email, and then the result can be verified in person... or are you
> suggesting something that doesn't require a calculator?
>
> i'll re-read through it tonight. are there any particular parts in
> particular that apply to our thread? the problem remains a social problem,
> not a computer problem.

Gotcha.  Well, as long as it's only a case of simple personal 
authentication  and not the evasion of a major government's dedicated 
intrusion attempts, I'd say do the confirmation over the telephone.  You 
can do PK key exchange through public channels and verify authenticity 
with a phone call.  It's not like ordinary individuals have networks of 
spies and spoofing servers at hand. 

>     "[The] feminist agenda is not about equal rights for women.
>      It is about a socialist, anti-family political movement that
>      encourages women to leave their husbands, kill their
>      children, practice witchcraft, destroy capitalism and become
>      lesbians."
>                -- Rev. Pat Robertson, 1992

And this guy still has an audience!
_______________________________________________
Gnupg-users mailing list
Gnupg-users at gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users





More information about the Gnupg-users mailing list