On Wed, Jan 16, 2013 at 9:21 PM, <[email protected]> wrote: > > > To clarify: I think everyone and everything should be identified by > > their public key,... > > Would re-analyzing all this in a key-centric model rather than > a name-centric model offer any insight? (key-centric meaning > that the key is the identity and "Dan" is an attribute of that > key; name-centric meaning that Dan is the identity and the key > is an attribute of that name)
Hmm... in which case identity fraud would take on a whole new meaning and "man who lose key, get no new key". Sorry; couldn't resist. -kevin -- Blog: http://off-the-wall-security.blogspot.com/ "The most likely way for the world to be destroyed, most experts agree, is by accident. That's where we come in; we're computer professionals. We *cause* accidents." -- Nathaniel Borenstein _______________________________________________ cryptography mailing list [email protected] http://lists.randombit.net/mailman/listinfo/cryptography
