From: hugh@ecotone.toad.com (Hugh Daniel)
To: an41418@anon.penet.fi
Message Hash: b8806cd8033d67d19d6e27e98158843693dd23264d03560b98f6906207c3fdb3
Message ID: <9310272135.AA24409@ ecotone.toad.com>
Reply To: <9310271725.AA18537@anon.penet.fi>
UTC Datetime: 1993-10-27 21:42:40 UTC
Raw Date: Wed, 27 Oct 93 14:42:40 PDT
From: hugh@ecotone.toad.com (Hugh Daniel)
Date: Wed, 27 Oct 93 14:42:40 PDT
To: an41418@anon.penet.fi
Subject: My key
In-Reply-To: <9310271725.AA18537@anon.penet.fi>
Message-ID: <9310272135.AA24409@ ecotone.toad.com>
MIME-Version: 1.0
Content-Type: text/plain
I think you miss the point of Public Key Crypto. The idea is that
you CAN publish your public key, to one and all. Then when you sign a
post with your private key (and do work hard to keep that key
private!), then anyone can verify that _you_ (in the guies of your
public/private key pair) wrote the message. No one else can sign a
message such that _your_ public key will decrypt the sig in a valid
way, unless you have let your private key leek out.
This is the whole wonderful idea that make Public Key crypto so
wonderful.
You are createing a strong and valued Psudonym, and signing your
messages will only make it stronger! Then there is no way to really
spoof a message from 'Wonderer', as you will be ('Wonderer'*KEY) and a
solid nym-citizen.
Make sence?
||ugh Daniel
hugh@toad.com
Return to October 1993
Return to “hugh@ecotone.toad.com (Hugh Daniel)”