Storing secrets on other people's computers

Christopher Tran me at christran.in
Fri May 6 00:49:01 CEST 2011


How about putting it on to twitter so it can be archived into the LOC?

On May 5, 2011, at 6:46 PM, Robert J. Hansen wrote:

>> For the latter, I don't get it -- it's not like keeping the key secret takes a lot of effort -- but it does decrease your security ever so slightly. Besides proving a point, why would you publish?
> 
> Because the _New York Times_ keeps records of all the papers it's ever published.  It can be seen as a highly effective, if low-tech, long-term archival solution.  Paperkey the private certificate, publish it in the NYT, verify the accuracy of the published certificate, and presto: your key is archived for the next 100+ years.
> 
> Honestly, half the reason why I volunteer to publish my certificate in the NYT is for precisely this reason.  I think it'd be kind of cool to (a) have the NYT be my data archive, and (b) get someone else to pay for it.  :)
> 
> (Assuming, of course, the NYT survives its current financial problems.  Which may be a very big if.)
> 
> 
> _______________________________________________
> Gnupg-users mailing list
> Gnupg-users at gnupg.org
> http://lists.gnupg.org/mailman/listinfo/gnupg-users

Christopher Tran
http://christran.in/
84730CD9



-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 3727 bytes
Desc: not available
URL: </pipermail/attachments/20110505/443254b3/attachment.bin>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: PGP.sig
Type: application/pgp-signature
Size: 881 bytes
Desc: This is a digitally signed message part
URL: </pipermail/attachments/20110505/443254b3/attachment.pgp>


More information about the Gnupg-users mailing list