Hi, > Off the top of my head, other techniques that make the same tradeoff are: > - Tor Hidden Services, as you mentioned > - SSH & OpenPGP fingerprints (here's my fingerprint, no matter where > you find it, that's my identifier) > - YURLs http://www.waterken.com/dev/YURL/httpsy/ > - From the above URL: Freenet's CHKs, Mnet's mnetids, Chord's keys, > Freenet's SSKs, SPKI's certificates
Add this here: https://gnunet.org/sites/default/files/grothoff_slides_berlin.pdf >From slide 39. Ralph -- Ralph Holz I8 - Network Architectures and Services Technische Universität München http://www.net.in.tum.de/de/mitarbeiter/holz/ Phone +49.89.289.18043 PGP: A805 D19C E23E 6BBB E0C4 86DC 520E 0C83 69B0 03EF -- Liberationtech is a public list whose archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at [email protected].
