[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Announcing Bellcore's Trusted Software Integrity (Betsi) System
In article <[email protected]>,
Avi Rubin <[email protected]> wrote:
>-----BEGIN PGP PUBLIC KEY BLOCK-----
...
>-----END PGP PUBLIC KEY BLOCK-----
>
>Fingerprint:
>
>5F 34 26 5F 2A 48 6B 07 90 C9 98 C5 32 C3 44 0C
I've seen this sort of thing several places...
Am I totally off base in thinking that distributing the fingerprint in
the same way as the public key is close to totally pointless?
--
L. Todd Masco | "Which part of 'shall not be infringed' didn't
[email protected] | you understand?"