From: Bill Stewart <stewarts@ix.netcom.com>
To: cypherpunks@toad.com
Message Hash: bf43dfc0f93918a4aca628e2494b617748c6d48c3df4176846a6f72a39b96d7d
Message ID: <199511292001.MAA16554@ix6.ix.netcom.com>
Reply To: N/A
UTC Datetime: 1995-11-29 21:13:16 UTC
Raw Date: Thu, 30 Nov 1995 05:13:16 +0800
From: Bill Stewart <stewarts@ix.netcom.com>
Date: Thu, 30 Nov 1995 05:13:16 +0800
To: cypherpunks@toad.com
Subject: Re: The future will be easy to use
Message-ID: <199511292001.MAA16554@ix6.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain
At 03:30 PM 11/28/95 EST, Carl Ellison <cme@TIS.COM> wrote:
>BTW -- PGP currently lacks a way for me to note, when I sign a key, how it
>is that I trust that key (by personal meeting, by attribution, by message
>association, ...). A signed attribute record would let me record that
>information for myself as well as for others.
That would be a useful feature, even if it's just an unstructured text file.
There is a way to do it now, though it's inefficient and hokey -
create multiple key-signing keys, with name fields indicating the attribute,
sign them with your main key, and use the appropriate one of them to
sign keys for people. For instance, I have a key named
"Bill Stewart Unauthenticated Pseudonym Signing Key <stewarts@ix.netcom.com>"
which I use to sign keys of significantly lower trust than my normal key;
you could do similar things for higher-quality certification.
This does increase the depth of the web-of-trust required, which is less
of a problem for low-trust keys than for keys you actually care about :-)
#--
# Thanks; Bill
# Bill Stewart, Freelance Information Architect, stewarts@ix.netcom.com
# Phone +1-510-247-0663 Pager/Voicemail 1-408-787-1281
Return to November 1995
Return to “Bill Stewart <stewarts@ix.netcom.com>”
1995-11-29 (Thu, 30 Nov 1995 05:13:16 +0800) - Re: The future will be easy to use - Bill Stewart <stewarts@ix.netcom.com>