[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: The future will be easy to use


>Date: Wed, 29 Nov 1995 00:10:16 -0800
>From: [email protected] (Bill Frantz)

>It is hard to see how to record the information about how much I trust the
>receipent's systems security.

I don't see a computer-understandable way to do that either -- but you have
provided an example of a human-readable way in your prior paragraph:

>			     I just added a key to my key ring that I will
>use for sending confidental data to a client site.  I trust that no one can
>access the secret key who is not also inside their firewall.  However, the
>key is on a multi-user system, so I do not trust that it is accessable to
>only one person.  Since the data I intend to send will be publicly
>available inside the firewall, I don't have to trust more than the

You could sign a small message consisting of:

	a) that paragraph
	b) the subject public key (or its good-enough hash)
	c) your public key (or its good-enough hash)

with your key and let that attribute declaration do the job.  It would only
be humans who could interpret it, but in the end it's humans who need to.
The computer should be able to find and use (b) and (c) -- but leave the
human to interpret (a).

I grant that they'd rather let the machine do the thinking for them, but
that may not be possible -- especially at this time in the evolution of
generally available security, before we learn patterns to codify in
computer-understandable abbreviations.

 - Carl

|Carl M. Ellison      [email protected]    http://www.clark.net/pub/cme	   |
|Trusted Information Systems, Inc.   http://www.tis.com/                   |
|3060 Washington Road          PGP 2.6.2:  61E2DE7FCB9D7984E9C8048BA63221A2|
|Glenwood MD  21738         Tel:(301)854-6889      FAX:(301)854-5363       |

Version: 2.6.2