1994-12-28 - Re: Why I have a 512 bit PGP key

Header Data

From: eric@remailer.net (Eric Hughes)
To: cypherpunks@toad.com
Message Hash: 638faa3a1de253d49c73743e33479ab70b1df5355e4390d699aa30d9f9abf6db
Message ID: <199412280454.UAA02250@largo.remailer.net>
Reply To: <9412281357.ZM11227@wiley.sydney.sgi.com>
UTC Datetime: 1994-12-28 04:55:04 UTC
Raw Date: Tue, 27 Dec 94 20:55:04 PST

Raw message

From: eric@remailer.net (Eric Hughes)
Date: Tue, 27 Dec 94 20:55:04 PST
To: cypherpunks@toad.com
Subject: Re: Why I have a 512 bit PGP key
In-Reply-To: <9412281357.ZM11227@wiley.sydney.sgi.com>
Message-ID: <199412280454.UAA02250@largo.remailer.net>
MIME-Version: 1.0
Content-Type: text/plain


   From: "Ian Farquhar" <ianf@sydney.sgi.com>

   I take it you mean recompile the binary every time?  Because you'd
   need to have source around to recompile it from, and the attacker
   could modify that source even more easily than he or she could hack
   the binary.  The idea is to make tampering with the binary detectable.

Recompile the binary from newly uploaded source each time.  MD5 source
isn't more than about 10K long.  That's all of a few seconds of upload
time.

   I am pretty much certain that to make such
   a system perfectly secure under these conditions is impossible.  

That's right.

Eric





Thread