Well I am not a guru on this subject and did not want to put my nose into that ( well
this is my MsD project at the moment ) but as far as I know impersonation is not the
only thing we try to achieve when we are using such things. We also use one way hash
functions to get a value out of our
ozymandias == ozymandias G desiderata [EMAIL PROTECTED] writes:
ozymandias Of course, this would be a different story if the web
ozymandias of trust were in more common usage, but it's not,
Ever think of *why* that is? And whether this is in any way related
to people's keys not being
Well I am not a guru on this subject and did not want to put my nose into that
( well this is my MsD project at the moment ) but as far as I know
impersonation is not the only thing we try to achieve when we are using such
things. We also use one way hash functions to get a value out of our
actually, you can get your public key signed by certification authorities.
That would be ideal, but there aren't many people out there getting their
keys certified.
On Mon, Jul 09, 2001 at 06:58:24PM -0700, ozymandias G desiderata wrote:
On Mon, Jul 09, 2001 at 01:23:29PM -0600, Hubert Chan
On Tue, Jul 10, 2001 at 09:04:42AM +0200, Philippe BARNETCHE wrote:
actually, you can get your public key signed by certification authorities.
That would be ideal, but there aren't many people out there getting their
keys certified.
Which is for the most part an utter waste of time, as they
ozymandias == ozymandias G desiderata [EMAIL PROTECTED] writes:
ozymandias Of course, this would be a different story if the web
ozymandias of trust were in more common usage, but it's not,
Ever think of *why* that is? And whether this is in any way related
to people's keys not being
actually, you can get your public key signed by certification authorities.
That would be ideal, but there aren't many people out there getting their
keys certified.
On Mon, Jul 09, 2001 at 06:58:24PM -0700, ozymandias G desiderata wrote:
On Mon, Jul 09, 2001 at 01:23:29PM -0600, Hubert Chan
ozymandias G desiderata [really?] wrote:
Of course, this would be a different story if the web of trust were in
more common usage, but it's not, outside of debian-maintainers and
some small klatches of die-hard cypherpunks, some of whom are too
paranoid to admit who they know anyway.
Besides
On Tue, Jul 10, 2001 at 09:04:42AM +0200, Philippe BARNETCHE wrote:
actually, you can get your public key signed by certification authorities.
That would be ideal, but there aren't many people out there getting their
keys certified.
Which is for the most part an utter waste of time, as they
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
ozymandias == ozymandias G desiderata [EMAIL PROTECTED] writes:
ozymandias On Mon, Jul 09, 2001 at 01:23:29PM -0600, Hubert Chan wrote:
Hubert PS. If you're going to PGP-sign your messages, you might want to
Hubert upload your key to a server, so
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hubert Chan [EMAIL PROTECTED] writes:
[snip]
BTW, I don't know why people sign their mail to mailing lists (other than
things like debian-security-announce). I do it because I think that all
e-mail, and for that matter, all internet traffic,
On Mon, Jul 09, 2001 at 01:23:29PM -0600, Hubert Chan wrote:
PS. If you're going to PGP-sign your messages, you might want to upload
your key to a server, so that we can check the sig.
At this late date, I'm a little confused as to what the benefit of key
servers are, and I'm even a little
On Mon, Jul 09, 2001 at 01:23:29PM -0600, Hubert Chan wrote:
PS. If you're going to PGP-sign your messages, you might want to upload
your key to a server, so that we can check the sig.
At this late date, I'm a little confused as to what the benefit of key
servers are, and I'm even a little bit
13 matches
Mail list logo