From: lefty@apple.com (Lefty)
To: cypherpunks@toad.com
Message Hash: 2a2ec79e06961459408a9db0785924fce6cd584af6d10ee45dc6d8b88e1fc512
Message ID: <9309072243.AA09027@internal.apple.com>
Reply To: N/A
UTC Datetime: 1993-09-07 22:51:44 UTC
Raw Date: Tue, 7 Sep 93 15:51:44 PDT
From: lefty@apple.com (Lefty)
Date: Tue, 7 Sep 93 15:51:44 PDT
To: cypherpunks@toad.com
Subject: Re: Who generates AOCE keys?
Message-ID: <9309072243.AA09027@internal.apple.com>
MIME-Version: 1.0
Content-Type: text/plain
Christian Odhner wonders:
>
>Well, what keeps people from makeing keys with somebody else's name/user
>id on them and sending them in to be certified? Where is the
>authentication from the key certifier's point of view?
The pass phrase.
--
Lefty (lefty@apple.com)
C:.M:.C:., D:.O:.D:.
Return to September 1993
Return to “lefty@apple.com (Lefty)”