Drew Van Zandt wrote: > Not to sound paranoid (though I suspect I am in this case) but what if > rather than a key compromise it's a crypto compromise
I'm looking into combining two digital signature systems, which would largely remove that risk. Code size is the only current constraint. > Now a group pools computing power (or quantum computing becomes > reality) Defending against quantum computing is *really* not part of the threat model :) -- Ivan Krstić <[EMAIL PROTECTED]> | GPG: 0x147C722D _______________________________________________ Devel mailing list [email protected] http://mailman.laptop.org/mailman/listinfo/devel
