On Wed, Jan 15, 2014 at 8:32 PM, Joseph Lorenzo Hall <[email protected]> wrote:
> I'm thinking of operations like fingerprint verification. I can
> analogize encryption to locking boxes with keys (even asymmetric or
> DHE), but when it comes to other kinds of things (even explaining the
> utility of a cryptographic hash), there aren't a lot of real-world
> analogies to bootstrap their intuition. Maybe this will come in future
> generations of socialized human.

It seems to me that a usable mail encryption and authentication system
should work without ever showing a user any kind of hash except for
key fingerprints, so you don't _need_ an analogy.

For the fingerprints, perhaps it would be best to just pretend that
the fingerprint is the _identity_ of the person.

cu,
Nicolai
-- 
Lerne, wie die Welt wirklich ist,
aber vergiss niemals, wie sie sein sollte.
-- 
Liberationtech is public & archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
[email protected].

Reply via email to