Drew Van Zandt wrote:
> Not to sound paranoid (though I suspect I am in this case) but what if
> rather than a key compromise it's a crypto compromise

I'm looking into combining two digital signature systems, which would
largely remove that risk. Code size is the only current constraint.

> Now a group pools computing power (or quantum computing becomes
> reality)

Defending against quantum computing is *really* not part of the threat
model :)

-- 
Ivan Krstić <[EMAIL PROTECTED]> | GPG: 0x147C722D
_______________________________________________
Devel mailing list
[email protected]
http://mailman.laptop.org/mailman/listinfo/devel

Reply via email to