On 2014-07-11 07:45, Kevin wrote:
On 7/10/2014 4:39 PM, John Young wrote:
https://blog.silentcircle.com/why-are-we-competing-with-phone-makers-skype-and-telecom-carriers-all-in-the-same-week/
With silent circle, when Ann talks to Bob, does Ann get Bob's public key
from silent circle, and Bob get Ann's public key from silent circle.
If they do it that way, silent circle is a single point of failure which
can, and probably will, be co-opted by governments.
If they don't do it that way, how do they do it.
Obviously we need a hash chain that guarantees that Ann sees the same
public key for Ann as Bob sees for Ann.
Does silent circle do that?
_______________________________________________
cryptography mailing list
[email protected]
http://lists.randombit.net/mailman/listinfo/cryptography