Certificate proposal
Mike McNally
m5 at dev.tivoli.com
Tue Oct 10 05:58:25 PDT 1995
Don M. Kitchen writes:
> > If we are forced to exchange keys remotely, then perhaps some sort of
> > "proof" techniques could be used to establish to some level of
> > assurance that the remote entity I *think* is you is really you. Or
>
> So who is Pr0duct Cypher then? And why should I have to produce ID saying
> my name is Don, unless I'm proving my Real Name[tm] is Don.
Right. If we're forced to exchange keys remotely, I just have to deal
with the possibility that I'm being spoofed.
> > you could provide me with a key, and then I could poll a list of
> > references to inquire as to the "goodness" of the key. This seems to
>
> But there's no way to prove that there's no MITM. But "middle" is a
> subjective term.
Yes, that's why I put "proof" in quotes. I guess I meant "demonstrate
to a personally sufficient level of satisfaction".
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
| Nobody's going to listen to you if you just | Mike McNally (m5 at tivoli.com) |
| stand there and flap your arms like a fish. | Tivoli Systems, Austin TX |
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
More information about the cypherpunks-legacy
mailing list