14 Nov
2005
14 Nov
'05
3:15 a.m.
"James A. Donald" <jamesd@echeque.com> writes:
James A. Donald:
I figured that the obvious solution to all this was to deploy zero knowledge technologies, where both parties prove knowledge of the shared secret without revealing the shared secret.
Florian Weimer <fw@deneb.enyo.de>
Keep in mind that one party runs the required software on a computed infected with spyware and other kinds of Trojan horses. This puts the effectiveness of zero-knowledge proofs into question.
My computers do not have spyware and Trojan horses.
My computers have no undetected spyware and Trojan horses. Peter.