home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!cs.utexas.edu!sdd.hp.com!usc!elroy.jpl.nasa.gov!decwrl!bu.edu!transfer!ellisun.sw.stratus.com!cme
- From: cme@ellisun.sw.stratus.com (Carl Ellison)
- Newsgroups: sci.crypt
- Subject: Re: Secure netnews
- Message-ID: <5978@transfer.stratus.com>
- Date: 28 Aug 92 05:47:09 GMT
- References: <1992Aug19.172555.14545@Princeton.EDU> <1992Aug27.132835.13294@sniap.mchp.sni.de>
- Sender: usenet@transfer.stratus.com
- Organization: Stratus Computer, Software Engineering
- Lines: 11
-
- In article <1992Aug27.132835.13294@sniap.mchp.sni.de> frank@D012S436.sniap.mchp.sni.de writes:
- >You could show me your passport (for example), then I'd know who you
- >are. Enough to associate you with the key you give me.
-
- You don't know me so you have no way of knowing if I'm the one who handed
- you the key and showed you the passport with my name on it.
-
- On the other hand, if we had a true broadcast mechanism -- eg., amateur
- radio? -- something which can't be spliced into so that the imposter could
- trap all your traffic or mine -- then we don't need to meet. All I have to
- do is broadcast my key and monitor my own broadcast.
-