13 Nov
2005
13 Nov
'05
5:18 p.m.
-- James A. Donald:
I figured that the obvious solution to all this was to deploy zero knowledge technologies, where both parties prove knowledge of the shared secret without revealing the shared secret.
Florian Weimer <fw@deneb.enyo.de>
Keep in mind that one party runs the required software on a computed infected with spyware and other kinds of Trojan horses. This puts the effectiveness of zero-knowledge proofs into question.
My computers do not have spyware and Trojan horses. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG +RC/0PUcBFXYvCMG168GCyW3kQ1ifJ8dR0h7MP6j 47J0CwidqkZvRp4RHuehm78yL5Q6Ux8pSu/TtUKZZ