keyserver spam
Jerome Baum
jerome at jeromebaum.com
Sat Dec 17 14:40:41 CET 2011
On 2011-12-17 14:29, gnupg at lists.grepular.com wrote:
> The system can be easily abused, therefore it will be abused. It's just
> a matter of time. How much time, depends on if/when PGP becomes more
> popular. It doesn't strike me as unreasonable to want to put defences in
> place before an attack begins.
Just like you shouldn't write blatantly inefficient code. But there's
also a point after which we call this premature optimization. Ditto for
putting up security measures for a problem that may well never become one.
I would be very happy to see this become a problem in fact. It would
imply that OpenPGP is popular enough to attract script kiddies & co.
--
PGP: A0E4 B2D4 94E6 20EE 85BA E45B 63E4 2BD8 C58C 753A
PGP: 2C23 EBFF DF1A 840D 2351 F5F5 F25B A03F 2152 36DA
--
nameserver 217.79.186.148
nameserver 178.63.26.172
http://opennicproject.org/
--
No situation is so dire that panic cannot make it worse.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 878 bytes
Desc: OpenPGP digital signature
URL: </pipermail/attachments/20111217/5a4da19c/attachment.pgp>
More information about the Gnupg-users
mailing list