Re: [Freedombox-discuss] Novel design philosophy for end-to-end cryptographic protocols and software

2015-05-10 Thread nathan nolast
your post was very long, not that it wasn't good, but i just want to premise my response with .. i skimmed the aforementioned. I have a scenario. foobar127 creates his freedombox social networking profile and posts information with his user key. foobar127 sends messages to various members

Re: [Freedombox-discuss] Novel design philosophy for end-to-end cryptographic protocols and software

2011-07-11 Thread Daniel Kahn Gillmor
On 07/09/2011 07:25 PM, Boaz wrote: [dkg wrote:] If the repressed source is known only publicly as fubar127, the non-repressed activist can use OpenPGP certifications to assert that fubar127 does in fact hold key X. Here I must disagree. The anonymous blogger named fubar127 does not need

[Freedombox-discuss] Novel design philosophy for end-to-end cryptographic protocols and software

2011-07-09 Thread Boaz
In recognition of the fact that the list is being swamped with enthusiastic but unspecific comments, and to help you decide not to read my post if it suits your fancy, I'm going to state right at the beginning of the post that I'm not a competent developer by any stretch. On the other hand, I