I get the feeling there is nothing left unhackable.  Even a
typewriter, they can plant a effing video recorder somewhere and film
you typing.  It used to be you made fun of the guy with tin foil on
his head to "block transmissions."

On 3/2/15, John Rose via AGI <[email protected]> wrote:
>> -----Original Message-----
>> From: Matt Mahoney via AGI [mailto:[email protected]]
>>
>> Peers need to know when two messages are from the same source. If a peer
>> earns a reputation for being a reliable source of information (like Google
>> or
>> your bank), then malicious peers will try to spoof messages from them. To
>> prevent this, peers sign their messages using a mutually agreed secret
>> key
>> chosen at random. After an initial exchange (using e.g. Diffie-Hellman),
>> I
>> send you a message and a signature like SHA256(message + key). You
>> receive
>> the message, compute the signature, and compare it to the signature that
>> I
>> sent you. Since nobody else knows the key, and the hash is not invertible,
>> you
>> know the message must have come from me.
>>
>
>
> Well, that's the same as using HTTPS or another application layer protocol
> over TLS/SSL with certificates signed by a certificate authority no? Though
> in your communications protocol you control the signing and encryption
> algorithm and everyone need not get a CA signed cert I suppose.
>
> John
>
>
>
>
>
>
> -------------------------------------------
> AGI
> Archives: https://www.listbox.com/member/archive/303/=now
> RSS Feed: https://www.listbox.com/member/archive/rss/303/11943661-d9279dae
> Modify Your Subscription:
> https://www.listbox.com/member/?&;
> Powered by Listbox: http://www.listbox.com
>


-------------------------------------------
AGI
Archives: https://www.listbox.com/member/archive/303/=now
RSS Feed: https://www.listbox.com/member/archive/rss/303/21088071-f452e424
Modify Your Subscription: 
https://www.listbox.com/member/?member_id=21088071&id_secret=21088071-58d57657
Powered by Listbox: http://www.listbox.com

Reply via email to