On Sun, 21 Apr 2002, Nick Johnson wrote: > > > for example, what do you do if you use the network to look up the pubkey > of > > > someone you want to contact, and it turns up more than one key, at least > one > > > of which could be the key of an intruder trying to listen to your > > > conversation? > > > > In that case the information should be thrown out. > > But what if the user has at some time created a second key under the same > email?
Oops. Never mind. Didn't think about that. -- http://kevin.atkinson.dhs.org _______________________________________________ freenet-tech mailing list [EMAIL PROTECTED] http://lists.freenetproject.org/mailman/listinfo/tech
