13 Nov
2005
13 Nov
'05
5:18 p.m.
-- James A. Donald:
I figured that the obvious solution to all this was to deploy zero knowledge technologies, where both parties prove knowledge of the shared secret without revealing the shared secret.
Florian Weimer
Keep in mind that one party runs the required software on a computed infected with spyware and other kinds of Trojan horses. This puts the effectiveness of zero-knowledge proofs into question.
My computers do not have spyware and Trojan horses. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG +RC/0PUcBFXYvCMG168GCyW3kQ1ifJ8dR0h7MP6j 47J0CwidqkZvRp4RHuehm78yL5Q6Ux8pSu/TtUKZZ