Gnupg-users Digest, Vol 76, Issue 11
Avi
avi.wiki at gmail.com
Mon Jan 11 17:49:00 CET 2010
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
For those of us without ACM access, these papers are freely
available at:
1) http://simson.net/ref/2004/chi2005_smime_submitted.pdf
2) http://www.soe.ucsc.edu/classes/cmps223/Spring09/Gaw%2006.pdf
Avi
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (MingW32) - GPGshell v3.75
Comment: Most recent key: Click show in box @ http://is.gd/4xJrs
iF4EAREKAAYFAktLVnQACgkQDWKwGfgOKfkAcwD+Ipg7IQboIQjrhlNiKxNDhY6E
7gO6w3hT2/bhjOe6b/wA/iT2O6lmOgfWmrxDpCT5qUQ5RR+KdYHN/ZM61dBYqkmM
=tjCQ
-----END PGP SIGNATURE-----
----
User:Avraham
pub 3072D/F80E29F9 1/30/2009 Avi (Wikimedia-related key) <avi.wiki at gmail.com
>
Primary key fingerprint: 167C 063F 7981 A1F6 71EC ABAA 0D62 B019 F80E
29F9
From: "Robert J. Hansen" <rjh at sixdemonbag.org>
> To: "Mario Castelán Castro" <mariocastelancastro at gmail.com>
> Date: Sun, 10 Jan 2010 23:37:12 -0500
> Subject: Re: Web of Trust itself is the problem
> On 01/10/2010 11:01 PM, Mario Castelán Castro wrote:
> >> Crypto is not like this. Sure, you don't need to understand Feistel
> >> networks or large number theory in order to use crypto, but look at
> >> what you *do* need to understand: [...]
> >
> > Is good if you know that, you will use the crypto better but is not
> > nessesary IMO. Can you explain why that things are *nessesary* in
> > order to use crypto?, we have "user friendly" crypto programs like
> > seahorse, I can't figure out someone is unable to use it with the
> > available "user friendly" software like seahorse.
>
> Read this paper:
>
> Garfinkel, S. L., Margrave, D., Schiller, J. I.,
> Nordlander, E., and Miller, R. C. 2005. How to make secure
> email easier to use. In _Proceedings of the SIGCHI Conference
> on Human Factors in Computing Systems_ (Portland, Oregon, USA,
> April 02 - 07, 2005). CHI '05. ACM, New York, NY, 701-710.
> DOI= http://doi.acm.org/10.1145/1054972.1055069
>
> Also read this paper:
>
> Gaw, S., Felten, E. W., and
> Fernandez-Kelly, P. 2006. Secrecy, flagging, and
> paranoia: adoption criteria in encrypted email.
> In Proceedings of the SIGCHI Conference on Human
> Factors in Computing Systems (Montreal, Quebec,
> Canada, April 22 - 27, 2006). R. Grinter,
> T. Rodden, P. Aoki, E. Cutrell, R. Jeffries, and
> G. Olson, Eds. CHI '06. ACM, New York, NY, 591-600.
> DOI= http://doi.acm.org/10.1145/1124772.1124862
>
>
> Once you've read them, then let's have this conversation again. The
> obstacles we face in crypto adoption are not related to user interfaces.
> They're related to users.
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: </pipermail/attachments/20100111/952505c7/attachment.htm>
More information about the Gnupg-users
mailing list