Secrecy and user trust
Ed Greshko
Ed.Greshko at greshko.com
Sun Sep 7 23:07:27 UTC 2008
Ed Greshko wrote:
>
> It would be very nice if someone would fully define what they mean by
> the very vague term "fake key".
>
And along with that, define the method used to distribute said key in a
manner that would be oblivious to the all end users. It has to be
oblivious to all end users such that nobody would be able to raise an
alarm in a reasonable amount of time.
If the public/private key methods employed today are as easy to
penetrate and subvert as some seem to be claiming then one has to
question why it hasn't already been done.
--
Gravity brings me down.
More information about the fedora-list
mailing list