Gnupg-users Digest, Vol 76, Issue 11

Avi avi.wiki at gmail.com
Mon Jan 11 17:49:00 CET 2010


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

For those of us without ACM access, these papers are freely
available at:

1) http://simson.net/ref/2004/chi2005_smime_submitted.pdf

2) http://www.soe.ucsc.edu/classes/cmps223/Spring09/Gaw%2006.pdf

Avi
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (MingW32) - GPGshell v3.75
Comment: Most recent key: Click show in box @ http://is.gd/4xJrs

iF4EAREKAAYFAktLVnQACgkQDWKwGfgOKfkAcwD+Ipg7IQboIQjrhlNiKxNDhY6E
7gO6w3hT2/bhjOe6b/wA/iT2O6lmOgfWmrxDpCT5qUQ5RR+KdYHN/ZM61dBYqkmM
=tjCQ
-----END PGP SIGNATURE-----


----
User:Avraham

pub 3072D/F80E29F9 1/30/2009 Avi (Wikimedia-related key) <avi.wiki at gmail.com
>
  Primary key fingerprint: 167C 063F 7981 A1F6 71EC  ABAA 0D62 B019 F80E
29F9


From: "Robert J. Hansen" <rjh at sixdemonbag.org>
> To: "Mario Castelán Castro" <mariocastelancastro at gmail.com>
> Date: Sun, 10 Jan 2010 23:37:12 -0500
> Subject: Re: Web of Trust itself is the problem
> On 01/10/2010 11:01 PM, Mario Castelán Castro wrote:
> >> Crypto is not like this.  Sure, you don't need to understand Feistel
> >> networks or large number theory in order to use crypto, but look at
> >> what you *do* need to understand: [...]
> >
> > Is good if you know that, you will use the crypto better but is not
> > nessesary IMO.  Can you explain why that things are *nessesary* in
> > order to use crypto?, we have "user friendly" crypto programs like
> > seahorse, I can't figure out someone is unable to use it with the
> > available "user friendly" software like seahorse.
>
> Read this paper:
>
>        Garfinkel, S. L., Margrave, D., Schiller, J. I.,
>        Nordlander, E., and Miller, R. C. 2005. How to make secure
>        email easier to use. In _Proceedings of the SIGCHI Conference
>        on Human Factors in Computing Systems_ (Portland, Oregon, USA,
>        April 02 - 07, 2005). CHI '05. ACM, New York, NY, 701-710.
>        DOI= http://doi.acm.org/10.1145/1054972.1055069
>
> Also read this paper:
>
>        Gaw, S., Felten, E. W., and
>        Fernandez-Kelly, P. 2006. Secrecy, flagging, and
>        paranoia: adoption criteria in encrypted email.
>        In Proceedings of the SIGCHI Conference on Human
>        Factors in Computing Systems (Montreal, Quebec,
>        Canada, April 22 - 27, 2006). R. Grinter,
>        T. Rodden, P. Aoki, E. Cutrell, R. Jeffries, and
>        G. Olson, Eds. CHI '06. ACM, New York, NY, 591-600.
>        DOI= http://doi.acm.org/10.1145/1124772.1124862
>
>
> Once you've read them, then let's have this conversation again.  The
> obstacles we face in crypto adoption are not related to user interfaces.
>  They're related to users.
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: </pipermail/attachments/20100111/952505c7/attachment.htm>


More information about the Gnupg-users mailing list