[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Crypto Kong penetration.
--
At 05:31 PM 1/15/98 +0000, Steve Mynott wrote:
> Ummm why reinvent the PGP wheel
Well I am not "reinventing the wheel".
Crypto Kong implements a different identity model. It does
not suppose that there are "true names".
This leads to substantially easier identity management
(largely by abolishing identity management)
As a necessary consequence of this, if you happen to be
communicating with two different Bob Jones, Crypto Kong does
not attempt to discover which one is the one true Bob Jones
and which is the evil man in the middle Bob Jones. It merely
keeps them distinct by applying different labels to them.
Secondly, PGP simply is not being adopted by the masses. Of
course right now, two weeks after release, Crypto Kong is not
being adopted by the masses either, but with very little
identity management, it is far easier for the masses to use.
If you try and shove that identity stuff onto people they
will not do it. Too much like hard work. They will happily
let the government licensed authorities do it for them. The
PGP model clearly has not flown yet, and it is not going to
fly.
--digsig
James A. Donald
6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
mMObRqZXvGz3OkHZyNWBCEGt5ZpZtUG5Y19i3tsX
4SfFX2/pUCYwhAm6n1u5xBLG/xL9LYsSZcznxXI8S
---------------------------------------------------------------------
We have the right to defend ourselves and our property, because of
the kind of animals that we are. True law derives from this right,
not from the arbitrary power of the state.
http://www.jim.com/jamesd/