On Wed, Jan 15, 2014 at 8:32 PM, Joseph Lorenzo Hall <[email protected]> wrote: > I'm thinking of operations like fingerprint verification. I can > analogize encryption to locking boxes with keys (even asymmetric or > DHE), but when it comes to other kinds of things (even explaining the > utility of a cryptographic hash), there aren't a lot of real-world > analogies to bootstrap their intuition. Maybe this will come in future > generations of socialized human.
It seems to me that a usable mail encryption and authentication system should work without ever showing a user any kind of hash except for key fingerprints, so you don't _need_ an analogy. For the fingerprints, perhaps it would be best to just pretend that the fingerprint is the _identity_ of the person. cu, Nicolai -- Lerne, wie die Welt wirklich ist, aber vergiss niemals, wie sie sein sollte. -- Liberationtech is public & archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at [email protected].
