|
ROF,LMFAO!! I see this as a challenge: a problem to be solved. an important problem. a few ideas,-- ( thoughts ? ) 1. users should generate a key-pair when they initialize their user ID on a device. I'm not sure yet what to do for a second or replacement device where the keyrings need to be ported. the obvious answer is a thumb drive bu that might not be the best answer 2. interfacing with the keyserver needs to be automated e.g. if I sign your key it might be best if the programming then updated the keyserver by default . 3. users should not need to access GnuPG or PGP directly. The Key Management dialog provided with ENIGMAIL is very good. I think I have two notes for it right now but they're kind of trivial 4. we should try to identify the rough spots so the whole thing can be tidied up as "packaged technology" . but in this the "too easy pit" is allowing the user to avoid participating . that is one of the keys that is missing in SSL/TLS. the user needs to participate 5. local credit unions or perhaps DMV offices could help to certify user keys . On 09/08/2015 05:45 PM, Robert J.
Hansen wrote:
I trust that we not fall into the too-easy pit<dark mutter>Frankly, OpenPGP couldn't fall into the too-easy pit if it was filled with hookers, cocaine, and supermassive black holes. </dark mutter> :) _______________________________________________ enigmail-users mailing list [email protected] To unsubscribe or make changes to your subscription click here: https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net -- /Mike |
_______________________________________________ enigmail-users mailing list [email protected] To unsubscribe or make changes to your subscription click here: https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net
