1994-08-10 - Re: Key Coercion after encrypted message transmission.

Header Data

From: farid@netcom.com (Farid F. El-Wailly)
To: cypherpunks@toad.com
Message Hash: 94e1a36b0eca82de544ddf93c848f40ef7f65552fd3ed768896a71627e10918a
Message ID: <199408101459.KAA29853@netcom14.netcom.com>
Reply To: <199408090533.AA06475@xtropia>
UTC Datetime: 1994-08-10 14:58:55 UTC
Raw Date: Wed, 10 Aug 94 07:58:55 PDT

Raw message

From: farid@netcom.com (Farid F. El-Wailly)
Date: Wed, 10 Aug 94 07:58:55 PDT
To: cypherpunks@toad.com
Subject: Re: Key Coercion after encrypted message transmission.
In-Reply-To: <199408090533.AA06475@xtropia>
Message-ID: <199408101459.KAA29853@netcom14.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


In article <199408090533.AA06475@xtropia> you write:
>
>
>People can use this protocol right now with PGP to protect themselves
>against this kind of retroactive coercion. It will work. However, the
>problem of manually generating the keys and sending them to the other
>party and the whole bureaucratic hassle of keeping track of everything
>makes it unlikely that anyone would actually do so.
>
Great idea.  You don't need to generate public/private keypairs though.
All you need are IDEA keys in these one time certificates and those
are easy to generate.

Regards,


-- 
Farid F. El-Wailly                 farid@netcom.com





Thread