-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Sun, Dec 01, 2002 at 06:18:12PM -0800, Edifice Wrecks wrote:
> [the wonderful world of PGP]
> 
> Using keyservers for signature verification wouldn't provide any
> particularly high security.   Identities on a keyserver can be forged
> too.   The only cryptographic information you should ever fully trust
> is information traceable to trusted out-of-band channels.

So, there are a lot of opportunities to exchange key fingerprint:
seminars, meetings, gooddies, phone calls.

Print your PGP key fingerprint on the back of your business card.
Establish a web of trust with your fellow exchange agents.

Maybe an agenda item for the next eCTA meeting?

Joris Bontje
- -- 
PGP Key: http://pgp.dtype.org:11371/pks/lookup?op=get&search=0xF19326A9
Key fingerprint = 730D 9B3A F406 F28A 957D 6397 31E8 6D4C F193 26A9
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQE963tVMehtTPGTJqkRAhO9AJ91dcuv386abZCM1KQ3b9+beMpFvwCdGlvX
ZGmPXTKpnulmedLFGrDYHF4=
=MlbW
-----END PGP SIGNATURE-----

---
You are currently subscribed to e-gold-list as: archive@jab.org
To unsubscribe send a blank email to [EMAIL PROTECTED]

Use e-gold's Secure Randomized Keyboard (SRK) when accessing your e-gold account(s) 
via the web and shopping cart interfaces to help thwart keystroke loggers and common 
viruses.

Reply via email to