[cryptography] phishing/password end-game (Re: Why anon-DH ...)

Kevin W. Wall kevin.w.wall at gmail.com
Wed Jan 16 21:25:50 EST 2013


On Wed, Jan 16, 2013 at 9:21 PM,  <dan at geer.org> wrote:
>
>  > To clarify:  I think everyone and everything should be identified by
>  > their public key,...
>
> Would re-analyzing all this in a key-centric model rather than
> a name-centric model offer any insight?  (key-centric meaning
> that the key is the identity and "Dan" is an attribute of that
> key; name-centric meaning that Dan is the identity and the key
> is an attribute of that name)

Hmm... in which case identity fraud would take on a whole new
meaning and "man who lose key, get no new key".

Sorry; couldn't resist.

-kevin
-- 
Blog: http://off-the-wall-security.blogspot.com/
"The most likely way for the world to be destroyed, most experts agree,
is by accident. That's where we come in; we're computer professionals.
We *cause* accidents."        -- Nathaniel Borenstein



More information about the cryptography mailing list