[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: A brief comparison of email encryption protocols
Alex Strasheim wrote:
| What's the advantage of using this url type system instead of "fully
| qualified" certificates, ie., attaching all the keys and signatures to the
| object? Doesn't the give and take with the key servers more than wipe out
| the advantage of the smaller data object?
|
| Does the win come from solving the revocation problem?
The win from a referenced system can come in two places.
First is standard places for keys, so I can ask a host for its telnetd's
key simply. Second is that I may already have cached some of the
keys, and not need, for example, they key for toad.com/s/sendmail/
Adam
--
"It is seldom that liberty of any kind is lost all at once."
-Hume