From:

> http://www.wired.com/news/politics/0,1283,42553,00.html

>"In this case, someone wishing to impersonate you would need to gain access
to your secret key -- usually stored on a hard drive or a floppy disk --
surreptitiously modify it, then obtain a message you signed using the
altered secret key. Once those steps are complete, that person could then
digitally sign messages using your name. "

OK, here's what I don't understand... If someone obtains your secret key,
then why can't they just use THIS key to sign email, and assume your
identity? Why do they need to modify it, reinsert it in your computer, and
then obtain a copy of a message that you subsequently send?

Craig



---
You are currently subscribed to e-gold-list as: archive@jab.org
To unsubscribe send a blank email to [EMAIL PROTECTED]

Reply via email to