From: Hal <74076.1041@CompuServe.COM>
To: CYPHERPUNKS <CYPHERPUNKS@TOAD.COM>
Message Hash: 1be047fb00ed9b8e7e62a36076bd875e747fc5da248ab50cd0ef9aff7be79589
Message ID: <92101315424474076.1041_DHJ92-2@CompuServe.COM>
Reply To: _N/A
UTC Datetime: 1992-10-13 15:55:18 UTC
Raw Date: Tue, 13 Oct 92 08:55:18 PDT
From: Hal <74076.1041@CompuServe.COM>
Date: Tue, 13 Oct 92 08:55:18 PDT
To: CYPHERPUNKS <CYPHERPUNKS@TOAD.COM>
Subject: Re: Mr. Squirrel
Message-ID: <921013154244_74076.1041_DHJ92-2@CompuServe.COM>
MIME-Version: 1.0
Content-Type: text/plain
||ugh Daniel raises some questions about using public keys to
verify pseudonyms:
> Hal is somewhat right, anyone can use 'Secret Squirrel' and anyone
> can use any public key they want also.
But, once person A creates public key X, nobody else can sign messages
using X. So if all messages from A are signed under X, we can know
that they are all from the same person, even if they are sent anonymously
or under a pseudonym.
> So, in a many-to-one scope (as
> in a maillist) where the sender can not use the one-on-one signed
> signiture method how do we have proff of who the sender really is?
You can use signatures even in a many-to-one scope. Messages from
a particular person could be signed and the signature appended to
the message. Then anyone who has the public key can check to see
who the message came from. The process is a little unwieldy now
in PGP because you have to separate the signature and message into
separate files and run PGP on the signature file. This should be
streamlined.
> [Good points about keeping track of key-pseudonym pairs]
> But all this needs to be done automaticly by the mailers and
> interfaces, else the system will be mis-used and folks will tire of
> the extra work that gets them little advantage.
Absolutely. The most crying need now, IMO, is to better integrate the
cryptographic tools into mail readers and senders, so that it's not
such a pain to use these things. People should be able to give a single
command or press a button to decrypt an incoming message or encrypt an
outgoing one. Only then will these features be used by average people.
There was a message posted on alt.security.pgp describing how to
use PGP with the Emacs mail reading program. I'd like to see more
messages telling how to use it with other systems.
Hal
74076.1041@compuserve.com
Return to October 1992
Return to “nowhere@bsu-cs.bsu.edu (Chael Hall)”