Two things:

1. This would be extremely useful for most people's communications; they
want privacy, not anonymity to deniability. (This sort of strong
proof-of-identity linked with a key is perfect for, e.g., doctors, lawyers,
and other professionals.)

(I agree with Trevor that Greenwald/Snowden is inapt.)

But. Suppose that Android app is malicious. For the static case, it can, I
assume, impersonate you forever. How does the private secret in
passports thing work?

2. Pond's low-bandwidth is an artificial constraint. It is easy enough to
run Pond sans Tor, with arbitrarily high message rate. (I've played around
with this a little, actually.)

Introductions are easy, while still avoiding spam: Just require a
really expensive non-parallelizable proof-of-work/puzzle (e.g., 4
core-hours). (The Bill Gates proposal.) Scrypt can't do this without vast
amounts of memory, but some of the PHC entrants can.

- David

>
_______________________________________________
Messaging mailing list
[email protected]
https://moderncrypto.org/mailman/listinfo/messaging

Reply via email to