[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Announcing Bellcore's Trusted Software Integrity (Betsi) System



In article <[email protected]>,
Avi Rubin <[email protected]> wrote:
>-----BEGIN PGP PUBLIC KEY BLOCK-----
...
>-----END PGP PUBLIC KEY BLOCK-----
>
>Fingerprint:
>
>5F 34 26 5F 2A 48 6B 07  90 C9 98 C5 32 C3 44 0C

I've seen this sort of thing several places...

Am I totally off base in thinking that distributing the fingerprint in
 the same way as the public key is close to totally pointless?
-- 
L. Todd Masco  | "Which part of 'shall not be infringed' didn't
[email protected]  |   you understand?"