list of end-to-end secure protocols, decentralized and end-to-end secure protocols [was: CryptoSeal shutters, ala: LavaBit]
On Mon, Oct 21, 2013 at 9:08 PM, Kelly John Rose <iam@kjro.se> wrote:
... The only solution is to not have the private key itself available to you
interestingly enough, it seems there is so very little analyzing this space. typical search for elligator, today, "Cited by 1" ... WTF? they will point out it's rude to bitch without a patch,... touché someone has to pay this decentralizing cost, and so far the consumer has refused. a "fun problem" to solve; good luck!
On Mon, Oct 21, 2013 at 9:47 PM, coderman <coderman@gmail.com> wrote:
...
The only solution is to not have the private key itself available to you
interestingly enough, it seems there is so very little analyzing this space.
the Snowden docs have shown that end-to-end is just part of the picture. availability is also key to endpoint privacy! (this is where decentralization and un-descriminate-able come into play...)
participants (1)
-
coderman