1994-08-29 - Re: Announcing Bellcore’s Trusted Software Integrity (Betsi) System

Header Data

From: cactus@bb.com (L. Todd Masco)
To: cypherpunks@toad.com
Message Hash: 8542d2947da6a729f7a0f8a19f50fb4497cebe11e071d28984ef76adce212222
Message ID: <33tf52$744@bb.com>
Reply To: <199408291628.MAA19544@faline.bellcore.com>
UTC Datetime: 1994-08-29 20:02:36 UTC
Raw Date: Mon, 29 Aug 94 13:02:36 PDT

Raw message

From: cactus@bb.com (L. Todd Masco)
Date: Mon, 29 Aug 94 13:02:36 PDT
To: cypherpunks@toad.com
Subject: Re: Announcing Bellcore's Trusted Software Integrity (Betsi) System
In-Reply-To: <199408291628.MAA19544@faline.bellcore.com>
Message-ID: <33tf52$744@bb.com>
MIME-Version: 1.0
Content-Type: text/plain


In article <199408291628.MAA19544@faline.bellcore.com>,
Avi Rubin <rubin@faline.bellcore.com> wrote:
>-----BEGIN PGP PUBLIC KEY BLOCK-----
...
>-----END PGP PUBLIC KEY BLOCK-----
>
>Fingerprint:
>
>5F 34 26 5F 2A 48 6B 07  90 C9 98 C5 32 C3 44 0C

I've seen this sort of thing several places...

Am I totally off base in thinking that distributing the fingerprint in
 the same way as the public key is close to totally pointless?
-- 
L. Todd Masco  | "Which part of 'shall not be infringed' didn't
cactus@bb.com  |   you understand?"





Thread