1995-11-29 - Re: The future will be easy to use

Header Data

From: Carl Ellison <cme@TIS.COM>
To: frantz@netcom.com
Message Hash: 5ad810706cd63783ba7adb72dae40a163222cf8a33b4bb1bb5c7da5566082687
Message ID: <9511291640.AA00683@tis.com>
Reply To: <199511290808.AAA14767@netcom2.netcom.com>
UTC Datetime: 1995-11-29 17:07:15 UTC
Raw Date: Thu, 30 Nov 1995 01:07:15 +0800

Raw message

From: Carl Ellison <cme@TIS.COM>
Date: Thu, 30 Nov 1995 01:07:15 +0800
To: frantz@netcom.com
Subject: Re: The future will be easy to use
In-Reply-To: <199511290808.AAA14767@netcom2.netcom.com>
Message-ID: <9511291640.AA00683@tis.com>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

>Date: Wed, 29 Nov 1995 00:10:16 -0800
>From: frantz@netcom.com (Bill Frantz)

>It is hard to see how to record the information about how much I trust the
>receipent's systems security.

I don't see a computer-understandable way to do that either -- but you have
provided an example of a human-readable way in your prior paragraph:

>			     I just added a key to my key ring that I will
>use for sending confidental data to a client site.  I trust that no one can
>access the secret key who is not also inside their firewall.  However, the
>key is on a multi-user system, so I do not trust that it is accessable to
>only one person.  Since the data I intend to send will be publicly
>available inside the firewall, I don't have to trust more than the
>firewall.

You could sign a small message consisting of:

	a) that paragraph
	b) the subject public key (or its good-enough hash)
	c) your public key (or its good-enough hash)

with your key and let that attribute declaration do the job.  It would only
be humans who could interpret it, but in the end it's humans who need to.
The computer should be able to find and use (b) and (c) -- but leave the
human to interpret (a).

I grant that they'd rather let the machine do the thinking for them, but
that may not be possible -- especially at this time in the evolution of
generally available security, before we learn patterns to codify in
computer-understandable abbreviations.

 - Carl

+--------------------------------------------------------------------------+
|Carl M. Ellison      cme@tis.com    http://www.clark.net/pub/cme	   |
|Trusted Information Systems, Inc.   http://www.tis.com/                   |
|3060 Washington Road          PGP 2.6.2:  61E2DE7FCB9D7984E9C8048BA63221A2|
|Glenwood MD  21738         Tel:(301)854-6889      FAX:(301)854-5363       |
+--------------------------------------------------------------------------+


-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBMLyM7FQXJENzYr45AQGErQP/QlElHIH2/tqbWtUR+hTyRUgTTEAsq18O
c9XbJ3OK+HW4WOmsxBQKgqx+/C0zsboo088rkqahG2UNLbC91iizVuAlU5zZth19
F49AAfCrnqDPMyBr+3VecAnHxj09AK5GeHiLQqepHvuyh0IN3hq44zKmeHkV3PHO
b8fPQ3tTJCk=
=K2WN
-----END PGP SIGNATURE-----





Thread