On Tue, May 14, 2013 at 09:16:28PM +0200, Melvin Carvalho wrote: > > FWIW I take this stuff pretty seriously myself. I generated my key > > securely in the first place, I use a hardware smartcard to store my PGP > > key, and I keep the master signing key - the key with the ability to > > sign other keys - separate from my day-to-day signing subkeys. I also > > PGP sign emails regularly, which means anyone can get a decent idea of > > if they have the right key by looking at bitcoin-development mailing > > list archives and checking the signatures. A truly dedicated attacker > > could probably sign something without my knowledge, but I've certainly > > raised the bar. > > > > Just out of curiosity, could PGP keyservers suffer from a similar 51% > attack as the bitcoin network?
What guarantees do you think a keyserver provides about the keys it returns? -- 'peter'[:-1]@petertodd.org 0000000000000142ad32a203b1627bee8126fa4bcd940b0da3f32bf1b5b07a24
signature.asc
Description: Digital signature
------------------------------------------------------------------------------ AlienVault Unified Security Management (USM) platform delivers complete security visibility with the essential security capabilities. Easily and efficiently configure, manage, and operate all of your security controls from a single console and one unified framework. Download a free trial. http://p.sf.net/sfu/alienvault_d2d
_______________________________________________ Bitcoin-development mailing list Bitcoin-development@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/bitcoin-development