> To clarify: I think everyone and everything should be identified by > their public key,...
Would re-analyzing all this in a key-centric model rather than a name-centric model offer any insight? (key-centric meaning that the key is the identity and "Dan" is an attribute of that key; name-centric meaning that Dan is the identity and the key is an attribute of that name) --dan _______________________________________________ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography