-----BEGIN PGP SIGNED MESSAGE-----

> > Fingerprint (SHA1): D2A0 9515 E9C5 6AFE BBF0 9FFF 90E0 10D0 7E45 30C9
> > Fingerprint (MD5):  431B 3720 AD4F 7FC6 C321 8DB3 41D0 DA60
> 
> What is the use of the fingerprints? Can they be used to verify something,
> somewhere?

hi rick,

the theory is that my message gives you an independent way of
knowing what the fingerprints of the certificate should be. if
you were a pedantically secure type of person, you might bring up (by
clicking the lock icon) the certificate details of any SSL secured web 
page prior to submitting confidential information. upon doing so, you
would
like to know that the certificate details you are seeing are indeed a
match for the data the site operators, which you trust, have announced as
legitimate. the mathematical way of doing so would be to double check the
fingerprint - the vernacular for the digital hash of the ASN.1 body of the
certificate. you would probably also check that the certificate issuer is
an expected entity, and that the business entity the certificate was
issued to is sensible. at that point,
the warm fuzzy feeling in your gut would not subside as you clicked the
submit
button on the form containing your well thought out non-pseudo randomly 
generated passphrase. :)

happy holidays all,
jay w.
[EMAIL PROTECTED]


-----BEGIN PGP SIGNATURE-----
Version: PGP 7.0.4

iQEVAwUBPCCNRsyM0YPqVE7FAQHTXwf9EKXU78ZSaM7j9MmPThY8FzFt08dW90q1
pzNK/Iwnn096ZTMkQZqF9bIs7qnJI2dc0sXajV5WaXL3wL4imLTlI1pKeSHnN0gE
WCI0lUQSbB+Q9pAf8CDwDempkJqPjeDoMWdYFoZMmuhOfFtvDelB3rt1d8L35pVa
8GYQelp9+7UOjh2MjPVqg1wWQOcj6ZoiFwevq5UXZNURJ/24IAfSvW1o9NQD3Jl2
y3qoE0tMblNtz+D8XOurx69bGSetmnOrg5prqMFehfkA/ZdsT9++63Daku0XZUud
vUSo4874J9aHtjDo9jDDX5Typ15RYt7neGCqc3Bh4XvNQBz/KGM9hg==
=oqGp
-----END PGP SIGNATURE-----

---
You are currently subscribed to e-gold-tech as: archive@jab.org
To unsubscribe send a blank email to [EMAIL PROTECTED]

Reply via email to