On Wed, 6 Dec 2000, Sean R. Lynch wrote:
On Wed, Dec 06, 2000 at 07:19:13AM -0600, Jim Choate wrote: [...]
It's possession of the private keys that will roast your goose.
Fortunately the public key can be stored using steganography, or on some medium that can be physically destroyed, or whatever.
That sort of destroys the 'public' part of that doesn't it? This takes us into the "if you've got a channel to send the code on how to decode the public key, why not send the public key privately? And if the channel is safe enough to send the key privately why not send the message itself? There is also the point that if there is a public key and you claim it valid then by assumption you're also claiming there is a private key. ____________________________________________________________________ Before a larger group can see the virtue of an idea, a smaller group must first understand it. "Stranger Suns" George Zebrowski The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage@ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- --------------------------------------------------------------------