From: “E. ALLEN SMITH” <EALLENSMITH@ocelot.Rutgers.EDU>
To: frantz@netcom.com
Message Hash: 8120cf27bb23a8618dce244aaa536cf10af60f71ccb15691c7a82478ae7a95a0
Message ID: <01I4ZOC70QOE8Y5IL9@mbcl.rutgers.edu>
Reply To: N/A
UTC Datetime: 1996-05-22 10:47:22 UTC
Raw Date: Wed, 22 May 1996 18:47:22 +0800
From: "E. ALLEN SMITH" <EALLENSMITH@ocelot.Rutgers.EDU>
Date: Wed, 22 May 1996 18:47:22 +0800
To: frantz@netcom.com
Subject: Re: Senator, your public key please?
Message-ID: <01I4ZOC70QOE8Y5IL9@mbcl.rutgers.edu>
MIME-Version: 1.0
Content-Type: text/plain
From: IN%"frantz@netcom.com" 22-MAY-1996 01:45:15.84
>Perhaps what is needed is anti-gravity for those signitures that are not
>desired by the key owner. The resulting map should show the closeness of
>the relationship.
I could see two different maps, one with such a feature (eliminating
relationships, or causing to repulse those which weren't with permissions -
via signing the signatures, or via mutual signing, as mentioned before by you
and me), and the other with all links. Both would give some interesting
interpretations.
One other way to use this would be to try out different transitivity
of trust measurements and see what produced the most logical result while
still (via other analysis) avoiding spoofing/MITM problems.
-Allen
Return to May 1996
Return to ““E. ALLEN SMITH” <EALLENSMITH@ocelot.Rutgers.EDU>”
1996-05-22 (Wed, 22 May 1996 18:47:22 +0800) - Re: Senator, your public key please? - “E. ALLEN SMITH” <EALLENSMITH@ocelot.Rutgers.EDU>