1994-12-13 - Re: Authentication vs encryption: CPs on the web

Header Data

From: “Amanda Walker” <amanda@intercon.com>
To: cypherpunks@toad.com
Message Hash: 6880954b6045db5d863d0765de499bdc15c41c66c0012199c1bada834e6c96f4
Message ID: <9412131646.AA13156@amanda.dial.intercon.com>
Reply To: N/A
UTC Datetime: 1994-12-13 21:46:08 UTC
Raw Date: Tue, 13 Dec 94 13:46:08 PST

Raw message

From: "Amanda Walker" <amanda@intercon.com>
Date: Tue, 13 Dec 94 13:46:08 PST
To: cypherpunks@toad.com
Subject: Re: Authentication vs encryption: CPs on the web
Message-ID: <9412131646.AA13156@amanda.dial.intercon.com>
MIME-Version: 1.0
Content-Type: text/plain


> I notice that the people who come to this topic from an 
> institutional point of view tend to be more interested in 
> the authentication aspects. 
> This seems to fit better into the control-oriented mindset.  
> With authentication you can track what people are doing 
> better; non-repudiable signatures could actually work in some ways 
> against the signer.  I think that may be one reason Phil Zimmermann 
> is famous for not signing his messages. :-)  But encryption can 
> actually work against institutional interests (compared to individual 
> ones) by making it harder to keep track of people's activities. 

Very much agreed.  This is why, in my description of the rough criteria I sent 
out, I included mention of self-signed certificates (which only show that you 
do in fact have the private key corresponding to a given public key), bare 
keys, and so on.

There clearly needs to be facilities for encrypted anonymous use.  To expand 
on my example of wanting sales literature to be signed so I know it's genuine, 
I correspondingly *don't* want to include a certificate with identifying 
information in my own query--I get enough junk mail already, and I don't want 
vendors to be able to capture market research at the browsing level (I haven't 
looked at WIRED's server for precisely this reason).


Amanda Walker
InterCon Systems Corporation






Thread