1996-01-06 - Re: Revoking Old Lost Keys

Header Data

From: tcmay@got.net (Timothy C. May)
To: cypherpunks@toad.com
Message Hash: 2529d2541211182f25f6d1d3c143358e7472aa9cf62c0b21131a97a939f0da7d
Message ID: <ad13f5e103021004cdef@[205.199.118.202]>
Reply To: N/A
UTC Datetime: 1996-01-06 18:00:22 UTC
Raw Date: Sun, 7 Jan 1996 02:00:22 +0800

Raw message

From: tcmay@got.net (Timothy C. May)
Date: Sun, 7 Jan 1996 02:00:22 +0800
To: cypherpunks@toad.com
Subject: Re: Revoking Old Lost Keys
Message-ID: <ad13f5e103021004cdef@[205.199.118.202]>
MIME-Version: 1.0
Content-Type: text/plain


At 9:10 AM 1/6/96, James Black wrote:
>Hello,
>
>On Fri, 5 Jan 1996, Bruce Baugh wrote:
>
>> The problem is this: how can one spread the word that an old key is no
>> longer to be used when one no longer has the pass phrase, and cannot
>> therefore create a revocation certificate?
>
>  If there is someone that you trust (or several people), just make a
>revocation certificate and possibly cut it into pieces, and just let
>those know when to send it out, so that you don't have to rely on a
>faulty memory, and by having it in several hands they can't just send it
>out, as they don't know the other people.  Just a thought.

If one can safely and securely store a revocation certificate for later
use, why not just store the much shorter passphrase?

--Tim May

We got computers, we're tapping phone lines, we know that that ain't allowed.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay@got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^756839 - 1  | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









Thread