Secrecy and user trust

Ed Greshko Ed.Greshko at greshko.com
Sun Sep 7 23:07:27 UTC 2008


Ed Greshko wrote:
>
> It would be very nice if someone would fully define what they mean by
> the very vague term "fake key".
>   
And along with that, define the method used to distribute said key in a
manner that would be oblivious to the all end users.  It has to be
oblivious to all end users such that nobody would be able to raise an
alarm in a reasonable amount of time.

If the public/private key methods employed today are as easy to
penetrate and subvert as some seem to be claiming then one has to
question why  it hasn't already been done.

-- 
Gravity brings me down.




More information about the fedora-list mailing list