On Sun, 21 Apr 2002, Nick Johnson wrote:

> > > for example, what do you do if you use the network to look up the pubkey
> of
> > > someone you want to contact, and it turns up more than one key, at least
> one
> > > of which could be the key of an intruder trying to listen to your
> > > conversation?
> >
> > In that case the information should be thrown out.
> 
> But what if the user has at some time created a second key under the same
> email?

Oops.  Never mind.  Didn't think about that.

-- 
http://kevin.atkinson.dhs.org


_______________________________________________
freenet-tech mailing list
[EMAIL PROTECTED]
http://lists.freenetproject.org/mailman/listinfo/tech

Reply via email to