Anarchy Eroded: Project Efnext

James A. Donald jamesd at echeque.com
Sun Dec 31 21:53:16 PST 2000


    --
At 06:56 PM 12/31/2000 -0500, David Honig wrote:
> I don't see why a secure text-chat program would be any different
> than PGPfone (using DH, not RSA).  Maybe easier i/o, tougher
> authentication since PGPfone uses human voice recog in part.

The method used by PGP phone against a man in the middle attack is
impossible for text programs, though fairly easy for voice and video.

A chat program needs a server, or interacting network of servers to
advertise presence.  This server could also act as a public key
server, invisibly to user, guaranteeing stability of identity -- that
this presence was the same entity as had been logged on under the same
name in previous sessions.

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     KjuvIUyDc+HD6sFxZIgkCD4ro8q+9eiwudhA21wi
     4kP3H+TQ6kIQ63kRHWvJaRJTrlfIfR1SVqjt5Wkdp

  ------
We have the right to defend ourselves and our property, because 
of the kind of animals that we are. True law derives from this 
right, not from the arbitrary power of the omnipotent state.

http://www.jim.com/jamesd/      James A. Donald






More information about the cypherpunks-legacy mailing list