Am 15.01.2015 um 15:02 schrieb carlo von lynX: > ever beat the power of adopting a person from the social graph. When > Amy, Eleanor, Billy and Jake claim that Bob is a friend of theirs, > and they all provide the same public key for Bob, why should Alice > worry that Bob may actually be a fake that fooled all their common > friends? > > So once a distributed graph is available as an instrument to the > majority of human beings, I expect that public keys will proliferate > freely and construct a solid basis for an end-to-end encrypted > infrastructure for humanity. The question to me is only who will > be the first to provide such a tool. I am not aware of anyone else > working on the same challenge.
C'mmon Carlo - a distributed graph, holding the state of some application process, build from signed messages, available at&from peers only, requiring enough signature from a given set to resist byzantine malicious parties - that's what you're calling here for. Or did I missunderstand your post? /Jörg -- [email protected] https://lists.secushare.org/mailman/listinfo.cgi/secu-share
