Bigsy Bohr (HE12026-01-21): > DID = SSH for the Internet > > global > interoperable > discoverable > verifiable across domains > not tied to a single serv
I do not understand what you are trying to say. But have you considered that an authentication scheme that accepts any source of authority is the same thing as no authentication at all? This is what you get when you give the solution first and try to devise a problem that matches it afterward: you get something complicated that does something useless. Regards, -- Nicolas George

