Announcing Bellcore's Trusted Software Integrity (Betsi) System

L. Todd Masco cactus at bb.com
Mon Aug 29 13:02:36 PDT 1994


In article <199408291628.MAA19544 at faline.bellcore.com>,
Avi Rubin <rubin at faline.bellcore.com> wrote:
>-----BEGIN PGP PUBLIC KEY BLOCK-----
...
>-----END PGP PUBLIC KEY BLOCK-----
>
>Fingerprint:
>
>5F 34 26 5F 2A 48 6B 07  90 C9 98 C5 32 C3 44 0C

I've seen this sort of thing several places...

Am I totally off base in thinking that distributing the fingerprint in
 the same way as the public key is close to totally pointless?
-- 
L. Todd Masco  | "Which part of 'shall not be infringed' didn't
cactus at bb.com  |   you understand?"






More information about the cypherpunks-legacy mailing list