key-signing for pseudonyms
dissectingtable at comast.net
Sun May 16 22:51:40 CEST 2004
Atom 'Smasher' wrote:
> >If you don't have a copy, you should get one, and the discussion you'd
> >find most useful is in chapter 22.
> ah, yes... secure key exchange algorithms....
> of course, i guess one secure way to do it is a DH key exchange over
> email, and then the result can be verified in person... or are you
> suggesting something that doesn't require a calculator?
> i'll re-read through it tonight. are there any particular parts in
> particular that apply to our thread? the problem remains a social problem,
> not a computer problem.
Gotcha. Well, as long as it's only a case of simple personal
authentication and not the evasion of a major government's dedicated
intrusion attempts, I'd say do the confirmation over the telephone. You
can do PK key exchange through public channels and verify authenticity
with a phone call. It's not like ordinary individuals have networks of
spies and spoofing servers at hand.
> "[The] feminist agenda is not about equal rights for women.
> It is about a socialist, anti-family political movement that
> encourages women to leave their husbands, kill their
> children, practice witchcraft, destroy capitalism and become
> -- Rev. Pat Robertson, 1992
And this guy still has an audience!
Gnupg-users mailing list
Gnupg-users at gnupg.org
More information about the Gnupg-users