[cryptography] Silent Circle Takes on Phones, Skype, Telecoms

James A. Donald jamesd at echeque.com
Fri Jul 11 06:27:57 EDT 2014


On 2014-07-11 07:45, Kevin wrote:
> On 7/10/2014 4:39 PM, John Young wrote:
>> https://blog.silentcircle.com/why-are-we-competing-with-phone-makers-skype-and-telecom-carriers-all-in-the-same-week/

With silent circle, when Ann talks to Bob, does Ann get Bob's public key 
from silent circle, and Bob get Ann's public key from silent circle.

If they do it that way, silent circle is a single point of failure which 
can, and probably will, be co-opted by governments.

If they don't do it that way, how do they do it.

Obviously we need a hash chain that guarantees that Ann sees the same 
public key for Ann as Bob sees for Ann.

Does silent circle do that?



More information about the cryptography mailing list