Bigsy Bohr (HE12026-01-21):
> DID = SSH for the Internet
> 
> global
> interoperable
> discoverable
> verifiable across domains
> not tied to a single serv

I do not understand what you are trying to say. But have you considered
that an authentication scheme that accepts any source of authority is
the same thing as no authentication at all?

This is what you get when you give the solution first and try to devise
a problem that matches it afterward: you get something complicated that
does something useless.

Regards,

-- 
  Nicolas George

Reply via email to