1993-10-27 - My key

Header Data

From: hugh@ecotone.toad.com (Hugh Daniel)
To: an41418@anon.penet.fi
Message Hash: b8806cd8033d67d19d6e27e98158843693dd23264d03560b98f6906207c3fdb3
Message ID: <9310272135.AA24409@ ecotone.toad.com>
Reply To: <9310271725.AA18537@anon.penet.fi>
UTC Datetime: 1993-10-27 21:42:40 UTC
Raw Date: Wed, 27 Oct 93 14:42:40 PDT

Raw message

From: hugh@ecotone.toad.com (Hugh Daniel)
Date: Wed, 27 Oct 93 14:42:40 PDT
To: an41418@anon.penet.fi
Subject: My key
In-Reply-To: <9310271725.AA18537@anon.penet.fi>
Message-ID: <9310272135.AA24409@ ecotone.toad.com>
MIME-Version: 1.0
Content-Type: text/plain


  I think you miss the point of Public Key Crypto.  The idea is that
you CAN publish your public key, to one and all.  Then when you sign a
post with your private  key (and do work hard to keep that key
private!), then anyone can verify that _you_ (in the guies of your
public/private key pair) wrote the message. No one else can sign a
message such that _your_ public key will decrypt the sig in a valid
way, unless you have let your private key leek out.
  This is the whole wonderful idea that make Public Key crypto so
wonderful.  
  You are createing a strong and valued Psudonym, and signing your
messages will only make it stronger!  Then there is no way to really
spoof a message from 'Wonderer', as you will be ('Wonderer'*KEY) and a
solid nym-citizen.
  Make sence?

		||ugh Daniel
		hugh@toad.com





Thread