[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

No Subject





##
In-reply-to: <[email protected]> (message from Matthew
	Nuckolls on Sat, 1 Nov 1997 14:53:49 -0600)
Subject: Re: cute.

-----BEGIN PGP SIGNED MESSAGE-----

Matthew Nuckolls says
> Warning: The following message is apolitical.
>
> > -----BEGIN PGP PUBLIC KEY BLOCK-----
> > mQCNAzRbd7MAAAEEAONwsEpUgiezyfP6lxBzM5SfHJS6MK12JyR09KBZp2rrW680
> > ...
> > =6dKS
> > -----END PGP PUBLIC KEY BLOCK-----
>
> What's the point in distribuing your public key through the same
> channels as a signature? Kinda defeats the purpose. 

The purpose is to create a persistent nym.  The signature, and public key
ensures that you know that this message is from the same person as you were
attempting to nit pick :-]

> I can't verify that the given public key is indeed yours, since
> you're anonymous.

True.  So it's only as good as the keys you might fetch from a keyserver
that you have no connection to in the web of trust.

You aren't supposed to link it to my True Name.

All that can be done is to get a signature from a timestamp server, and a
signature from Bill Stewart's nym key signing service.

I don't think there are any timestamp servers which provide key signatures.

Anyone want to start one?

This is important because it prevents someone else from generating more
keys with the same userID, such as happened with Tim May's blacknet key.
The only protection I have against that is the public record of my key
being posted to cypherpunks.  The http://infinity.nus.sg/cypherpunks/
archive helps as a public record of first publishing of a key with this
userID.

A timestamp service signature on my key would be a better solution.

Amad3us

-----BEGIN PGP SIGNATURE-----
iQCVAwUBNFugu/KMuKFNFivhAQEJUwP7BUCoER9V60RDWQHLRNB1tGudDwWtQsRy
lnZJuI+VK9ljr5ze6O8b7/3WLItSqxyd4o+yyf/hx7SARqyZ1BV6KEljUXe7i3RQ
4Dy5H7/E+hZe9B4cN9OYs8A2oAcLKs5fIYSKqyEado6+IL4G9YrDTNmz28z/flmY
kvfVsPWKk7w=
=oXSI
-----END PGP SIGNATURE-----
-----BEGIN PGP PUBLIC KEY BLOCK-----
mQCNAzRbd7MAAAEEAONwsEpUgiezyfP6lxBzM5SfHJS6MK12JyR09KBZp2rrW680
4vbKAO/oteftRRM1jYYaQM6pUd2Tbb9z+cSuQGr2GH9kQ0Y7bllh89E1PItj7frG
ARSCbt1gbbXDXEICY8Ne1zZB7FfMt2qGVBdrKG/i2vfdZa5+n/KMuKFNFivhAAUR
tCNBbWFkM3VzIDxjeXBoZXJwdW5rc0BjeWJlcnBhc3MubmV0PokAlQMFEDRbjMPy
jLihTRYr4QEB38ED/1P9L2yLURl5B2GJok3eIf6EnF1ahFxSK7wuK++YfKRKb3Ku
oPTzwSXH+92PZX28dpC+aYu8Qb0dMSCk4Cadn9cxz4n42u509JU4z0o897lB4u2I
TxV3YKbBAQSv/jZ/Gq8drdFtemQXUPigNL6IjDAPc/REiHv7IZNKAniSBo1P
=N8Gg
-----END PGP PUBLIC KEY BLOCK-----